BYOD Policy for [AGENCY]



Similar documents
[BRING YOUR OWN DEVICE POLICY]

BYOD. opos WHAT IS YOUR POLICY? SUMMARY

Bring Your Own Device (BYOD) Policy

Bring Your Own Device. Individual Liable User Policy Considerations

Consumer Device Policy (Smartphones / Tablets) BYOD (Bring Your Own Device)

Bring Your Own Device (BYOD)

Mobile Device Usage and Agreement Policy

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

USE OF PERSONAL MOBILE DEVICES POLICY

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Mobile Security Standard

Mobile Devices Policy

How To Write A Mobile Device Policy

How To Understand The Bring Your Own Device To School Policy At A School

Corporate Mobile Policy Template

BRING YOUR OWN DEVICE POLICY (BYOD)

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Franciscan University of Steubenville Information Security Policy

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

IS BYOD (BRING YOUR OWN DEVICE) PART OF YOUR COMPANY S FIELD SERVICE AUTOMATION PLAN?

Bring Your Own Device (BYOD) Policy Revised: April 2012

Technology Department 1350 Main Street Cambria, CA 93428

Guideline on Safe BYOD Management

How To Manage A Mobile Device Management (Mdm) Solution

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY

Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users

esnc ACCESS AGREEMENT

Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com

Bring Your Own Device (BYOD) and Mobile Device Management.

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology

Newark City Schools Computer Network, Internet And Bring Your Own Device (BYOD) Acceptable Use Policy and Agreement

Getting Started - MDM Setup

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

MOBILE REMOTE DEPOSIT SERVICES AGREEMENT

How To Make Bring Your Own Device A Plus, Not A Risk

Students are expected to have regard to this policy at all times to protect the ipads from unauthorised access and damage.

NNPS Bring Your Own Device Guidelines for Students

Tom Schauer TrustCC cell

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

Bring Your Own Device Policy

Hands on, field experiences with BYOD. BYOD Seminar

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

TouchDown for Android

Kony Mobile Application Management (MAM)

LabTech Mobile Device Management Overview

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Sophos Mobile Control User guide for Apple ios. Product version: 4

BUSINESS ONLINE BANKING AGREEMENT

Android support for Microsoft Exchange in pure Google devices

Northeast Bank Mobile Deposit Service FAQ

SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices

Sophos Mobile Control user help. Product version: 6.1

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

HIPAA Security Training Manual

Kaspersky Security for Mobile

Bring Your Own Device (BYOD) and Mobile Device Management

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

COMPUTER USE POLICY. 1.0 Purpose and Summary

Quincy Public Schools Information Technology. Acceptable Use Policy for Staff, Students, and Guests

Enterprise Mobility as a Service

Deploying iphone and ipad Mobile Device Management

Addressing NIST and DOD Requirements for Mobile Device Management

ACCEPTABLE USE POLICY

DIOCESE OF DALLAS. Computer Internet Policy

Windows Phone 8.1 in the Enterprise

THE ENTERPRISE MOBILITY POLICY GUIDEBOOK

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

CITY OF SALINE CELL PHONE POLICY

Massachusetts College of Pharmacy and Health Sciences Information Services Acceptable Use Policy

NBT Bank Personal and Business Mobile Banking Terms and Conditions

iphone in Business Mobile Device Management

Securing Corporate on Personal Mobile Devices

Corporate-level device management for BlackBerry, ios and Android

POLICIES AND REGULATIONS Policy #78

Information Technology Security Policies

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306)

Transcription:

BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein referred to as BYOD User ) to access [AGENCY] network resources. Access to and continued use of network services is granted on condition that each BYOD User reads, signs, respects, and follows the [AGENCY] s policies concerning the use of these devices and services. [AGENCY] reserves the right to revoke this privilege if BYOD Users do not abide by the policies and procedures outlined below. This policy is intended to protect the security and integrity of [AGENCY] s data and technology infrastructure. Limited exceptions to the policy may occur due to variations in devices and platforms. BYOD User must agree to the terms and conditions set forth in this policy in order to be able to connect their devices to the [AGENCY] network, whether by wireless or overtheair access via cellular or other network. Expectation of Privacy: [AGENCY] will respect the privacy of your personal device and will only request access to the device by technicians to implement security controls, as outlined below, or to respond to legitimate discovery requests arising out of administrative, civil, or criminal proceedings (applicable only if BYOD User downloads business email/attachments/documents to their personal device). Acceptable Use [AGENCY] defines acceptable business use as activities that directly or indirectly support the business of [AGENCY]. [AGENCY] defines acceptable personal use of Device on agency time as reasonable and limited personal communication or recreation, such as reading or game playing. BYOD User agrees that the Device will not be shared with other individuals or family members, due to the business use of the device (potential access to business email, and related risks); BYOD User is blocked from accessing certain websites during work hours and/or while connected to the corporate network at the discretion of [AGENCY]. The list of restricted websites is available upon request. Device camera and/or video capabilities are not disabled while onsite. Any use of the Device during the course of business work shall be owned by [AGENCY]. Devices may not be used at any time to: Store or transmit illicit materials Store or transmit proprietary information belonging to another agency Harass others Engage in outside business activities 1

Other activities which are inconsistent with our business practices The following apps are allowed: {Include a detailed list of apps, such as weather, productivity apps, Facebook, etc., which will be permitted} The following apps are not allowed: {Apps not downloaded through itunes or Google Play, etc.} BYOD User may use the Device to access [AGENCY]owned resources: [email, calendars, contacts, documents, etc.] [AGENCY] has a zerotolerance policy for texting or emailing while driving and only handsfree talking while driving is permitted. BYOD User agrees to delete any sensitive business files that may be inadvertently downloaded and stored on the device through the process of viewing email attachments. [AGENCY] ISO will provide instructions for identifying and removing these unintended file downloads. Follow the premise, When in doubt, delete it out. Devices and Support Permitted Devices are as follows: Smartphones including those using the ios, Android, Blackberry and Windows operating system are allowed (the list should be as detailed as necessary including models, operating systems, versions, etc.). Tablets including those using the ios, Android and Windows are allowed (the list should be as detailed as necessary including models, operating systems, versions, etc.). Connectivity issues are supported by IT: BYOD Users should/should not contact the device manufacturer or their carrier for operating system or hardwarerelated issues. Devices must be presented to IT for proper job provisioning and configuration of standard apps, such as browsers, office productivity software and security tools, before they can access the network. Reimbursement {Choose your reimbursement option} [AGENCY] will/will not reimburse the BYOD User for a percentage of the cost of the device {include the amount of [AGENCY] s contribution}, or [AGENCY] will contribute {X} amount of money toward the cost of the device. {OR} 2

[AGENCY] will a) pay the BYOD User an allowance, b) cover the cost of the entire phone/data plan, c) pay half of the phone/data plan, etc. {OR} [AGENCY] will/will not reimburse the BYOD User for the following charges: roaming, plan overages, etc. Security In order to prevent unauthorized access, all devices must be passwordprotected using the features of the device and a strong password is required to access [AGENCY] network. [AGENCY] s strong password policy for mobile devices is: Passwords must be at least six characters and a combination of upper and lowercase letters, numbers and symbols. Passwords shall be changed every 90 days and the new password can t be one of the previous 15 passwords. The device must lock itself with a password or PIN if idle for one minute. All mobile devices will contain the proper encryption for that particular device. If encryption is not possible, e.g., due to the age of the device, then access may not be authorized. After five failed login attempts, the device must be set to lock. Rooted (Android) or jailbroken (ios) devices are strictly forbidden from accessing the network. BYOD Users are automatically prevented from downloading, installing and using any app that does not appear on [AGENCY] s list of approved apps. Devices that are not on the [AGENCY] s list of supported devices {are/are not} allowed to connect to the network. BYOD Users access to [AGENCY] data is limited based on BYOD User profiles defined by IT and automatically enforced. The BYOD User s device may be remotely wiped if 1) the device is lost, 2) the BYOD User terminates his or her employment, 3) IT detects a data or policy breach, a virus or similar threat to the security of [AGENCY] s data and technology infrastructure. Risks/Liabilities/Disclaimers While IT will take every precaution to prevent the BYOD User s personal data from being lost in the event it must remote wipe a device, it is the BYOD User s responsibility to take additional precautions, such as backing up email, contacts, and other personal information and/or data. [AGENCY] reserves the right to disconnect devices or disable services without notification. Lost or stolen devices must be reported to [AGENCY] within 24 hours. BYOD User is responsible for notifying their mobile carrier immediately upon loss of a device. 3

BYOD User is expected to use his or her devices in an ethical manner at all times and adhere to [AGENCY] s acceptable use policy as outlined above. BYOD User is personally liable for all costs associated with his or her device. BYOD User assumes full liability for risks including, but not limited to, the partial or complete loss of company and personal data due to an operating system crash, errors, bugs, viruses, malware, and/or other software or hardware failures, or programming errors that render the device unusable. [AGENCY] reserves the right to take appropriate disciplinary action up to and including termination for noncompliance with this policy. 4

USER ACKNOWLEDGMENT AND AGREEMENT Name: Date: Job Title: Job responsibilities that require access to company data via mobile device: I understand that by submitting this form I am requesting mobile device services from [Agency], and that I agree to be bound by the company s policies, standards and procedures and be responsible for reviewing and complying with all provisions of said policies. I understand that as the Information Owner, [Agency] retains the right to revoke access to company data at any time, for any reason, without notification to myself, regardless of device ownership. Signature of User: Date: Approved by Department Manager Signature: Print Name: Date: IT use only Use approved by: Date: Data Access: Email Data Device owner: Service Provider: Phone Number: 5

SIM: IMEI: Service Start Date: By: Service Termination Date: By: 6