1. Raymond Roth
Bring Your Own Device (BYOD) Policy
Introduction Thissecuritypolicyprovidesthe rules to abide by if you so choose to bring
your own device to our business environment.
Effective Date The controls appendedwithinthisdocument are to take affect September
19, 2012.
Audience Thispolicyappliestoall personswho choose to take part in our company’s
bring your device to work pilot program. This includes all persons who
choose to connectto our company’snetwork, be that of employees of the
company or outside contractors.
Background Thispolicyisbeingsetforthbecause personal devicesbroughtfromoutside
sources are not as secure as devices used specifically for our private work
environment.Please adhere to the controls within this document to keep
your device and networking activities secure.
Definitions The definitions that follow have been added to help the reader of this
document understand abbreviations set forth in the policy.
HTTP – Hypertext Transfer Protocol
VM– Virtual Machine
VPN – Virtual Private Network
2. Bring Your Own
Device (BYOD)
Policy
Before anyuseris able touse theirowndevice,theyshall signawritten
acceptance of understanding to the terms set forth in this document.
Before being permitted to use a personal device all users must sit
through a class room session, informing the user of how to secure a
personal device and the dangers of not securing a device.
Users whom bring their own device to work shall have the company’s
best interest in mind when using personal devices.
When using a personal device one shall connect to a predefined IP
address created for secure networking through a remote desktop
connection or VMsoftware.
All usersshall disable VPN programsortunnelingsoftware thathidesIP
address, internet activities and trends while using HTTP.
All persons shall either upload all work related materials to our team
collaboration site or to a share-drive that resides on the company’s
private network.
There are to be no inappropriate materials viewed with your device
while on the company’s network.
All private devices shall be checked in and checked out with the front
desk each and every day, until further notified.
There is to be no illegal activities permitted from your device while
connected to the company’s network.
If your device isdamaged on company grounds, the company holds no
responsibility for repairing said device.
If during work hours you are onsite with a private device and that
device hasbeen compromised,yourdevicewillnolongerbe permitted
to be brought to work under this pilot policy.
Disciplinary Actions Anyusersthat do not adhere to the definitions set forth within this policy
for secure device use will be punished. Be it removal of authorization to
partake inthe BYOD privilege,suspension or expulsion from the company.
References
All work done on this assignment is solely the work of my own.