XYZ gives its employees the privilege of buying and using the smartphones and tablets of their choice at work. XYZ Reserves the right to revoke this authorization if users do not comply with the following policies and procedures. Bring Your Own Device (BYOD) Programs require three critical elements: a software application for managing network-connected devices, a written policy that defines the responsibilities of the employer and the user, and an agreement that users must sign by acknowledging that they have read and understood the policy. Below is a BYOD policy model that allows organizations to tailor their needs (additional details, if useful). Some companies may have to add sections that apply to different groups of users with different order requirements. Finally, you should be sure that a lawyer is checking this situation. Family and friends should not use personal devices used for commercial purposes. Following the resignation or termination of the employment relationship or at any time upon request, the employee may be asked to submit the personal device to the inspection. All company data on personal devices is removed from IT after the termination of the working relationship. Writing a BYOD policy forces companies to think before letting their employees go onto the organization`s network with their own smartphones and tablets.
Issues that need to be addressed by company management during the planning phase include: which browsers should employees use? What security tools offer the best protection for the many devices that can connect to the network? What support does IT need to provide? To ensure that nothing is overlooked, you get contributions from employees throughout the company: HR, IT, accounting, law – workers and executives. Employees may not use their personal devices for work purposes during periods of unpaid leave without management`s permission. [Company name] reserves the right to disable the company`s application and access to the employee`s personal device during periods of unpaid leave. No employee who uses his or her personal device should expect privacy, except for the one subject to the law. [Company name] has the right to monitor and retain at any time all communications that use [company name] networks in any way, including data, voicemail, telephone protocols, Internet use and network traffic, to determine proper use. To ensure the security of information [company name], authorized employees must install antivirus and MDM software on their personal mobile devices. This MDM software records all company-related information, including calendars, emails and other applications, in a password-protected and secure area. The [Company Name] IT department must install this software before using the personal device for work purposes. Staff working in areas at risk of explosion should forego the use of personal devices during their work in these areas, as such use may pose a significant safety risk.
All employees must use a pre-defined ringtone and a warning for corporate messages and calls. Personal devices must be turned off or set to silent or vibrating mode during meetings and conferences or in other locations where incoming calls can interfere with normal operation. Employees who have not obtained written permission from [company name] management and have not given written consent should not use personal devices for work purposes. Failure to comply with [company name] guidelines and procedures may lead to disciplinary action up to termination of employment.