Download 21.11 Kb.
A typeDocumentation



Specializing In The Energy Industry



Description: Personal Devices @ Work

Below is a sample BYOD policy template that organizations can adapt to suit their needs (include additional details where it makes sense).  Some companies may need to add sections that apply to different user groups with varying job requirements. Finally, be sure to have legal counsel review it. This policy should be included in your onboarding and reviewed annually by management.

Safe guarding your electronic assets in an advanced age of technology can be very daunting for many organizations. If you require additional help, please contact Simon Reynolds, Partner IT Governance @ Advantage Professional. Simon has over 25 years leading IT Governance, IT Security & Fraud. He is exceptional at finding affordable solutions for small business and those in rapid growth.


National Rental Inc. March 31, 2016

Corporate Policy No: CP1-004 Issue 1

Bring Your Own Device (BYOD)
National Rental Inc. grants its employees, contractors and directors the privilege of purchasing and using Smartphone's and tablets of their choosing at work for their convenience. National Rental Inc. reserves the right to revoke this privilege if users do not abide by the policies and procedures outlined below.

This policy is intended to protect the security and integrity of National Rental Inc's data and technology infrastructure. Limited exceptions to the policy may occur due to variations in devices and platforms.

National Rental employees, contractors and directors must agree to the terms and conditions set forth in this policy in order to be able to connect their devices to the company network.

Acceptable Use

  • The company defines acceptable business use as activities that directly or indirectly support the business of National Rental Inc.

  • The company defines acceptable personal use on company time as reasonable and limited personal communication or recreation, such as reading or game playing.

  • Employees are blocked from accessing certain websites during work hours/while connected to the corporate network at the discretion of the company. Such websites include, but are not limited to: Face book, Instagram, Twitter, LinkedIn and personal email servers. Further, Internet access will only be granted to individuals requiring it as part of their daily job functions.

  • Devices’ camera and/or video capabilities are/are not disabled while on-site.

  • Devices may not be used at any time to:

    • Store or transmit illicit materials

    • Store or transmit proprietary information belonging to another company

    • Harass others

    • Engage in outside business activities

    • Etc.

  • The following apps are allowed: (include a detailed list of apps, such as weather, productivity apps, Facebook, etc.)

  • The following apps are not allowed: (apps not downloaded through iTunes or Google Play, etc.)

  • Employees may use their mobile device to access the following company-owned resources: email, calendars, contacts, documents, etc.

  • National Rental Inc. has a zero-tolerance policy for texting or emailing while driving and only hands-free talking while driving company vehicles is permitted.

Devices and Support

  • Smartphone's including iPhone, Android, Blackberry and Windows phones are allowed (the list should be as detailed as necessary including models, operating systems, versions, etc.).

  • Tablets including iPad and Android are allowed (the list should be as detailed as necessary including models, operating systems, versions, etc.).

  • Connectivity issues are supported by IT; employees should/should not contact the device manufacturer or their carrier for operating system or hardware-related issues.

  • Devices must be presented to IT for proper job provisioning and configuration of standard apps, such as browsers, office productivity software and security tools, before they can access the network.


  • The company will/will not reimburse the employee for a percentage of the cost of the device (include the amount of the company’s contribution), or The company will contribute X amount of money toward the cost of the device.

  • The company will a) pay the employee an allowance, b) cover the cost of the entire phone/data plan, c) pay half of the phone/data plan, etc.

  • The company will/will not reimburse the employee for the following charges: roaming, plan overages, etc.


  • In order to prevent unauthorized access, devices must be password protected using the features of the device and a strong password is required to access the company network.

  • The company’s strong password policy is: Passwords must be at least six characters and a combination of upper- and lower-case letters, numbers and symbols. Passwords will be rotated every 90 days and the new password can’t be one of 15 previous passwords.

  • All passwords must be registered and approved by the IT Support Team prior to changing.

  • The device must lock itself with a password or PIN if it’s idle for five minutes.

  • After five failed login attempts, the device will lock. Contact IT to regain access.

  • Rooted (Android) USB Flash drives and other devices are strictly forbidden from accessing the network.

  • Employees are automatically prevented from downloading, installing and using any app that does not appear on the company’s list of approved apps.

  • Smartphones and tablets that are not on the company’s list of supported devices are/are not allowed to connect to the network.

  • Smartphones and tablets belonging to employees that are for personal use only are/are not allowed to connect to the network.

  • Employees’ access to company data is limited based on user profiles defined by IT and automatically enforced. Your user profile is established based upon your job requirements. See HR or your manager to redefine your access when you assume additional duties such as during vacation periods.

  • The employee’s device may be remotely wiped if 1) the device is lost, 2) the employee terminates his or her employment, 3) IT detects a data or policy breach, a virus or similar threat to the security of the company’s data and technology infrastructure.


  • While IT will take every precaution to prevent the employee’s personal data from being lost in the event it must remote wipe a device, it is the employee’s responsibility to take additional precautions, such as backing up email, contacts, etc.

  • The company reserves the right to disconnect devices or disable services without notification.

  • Lost or stolen devices must be reported to the company within 24 hours. Employees are responsible for notifying their mobile carrier immediately upon loss of a device.

  • The employee is expected to use his or her devices in an ethical manner at all times and adhere to the company’s acceptable use policy as outlined above.

  • The employee is personally liable for all costs associated with his or her device.

  • The employee assumes full liability for risks including, but not limited to, the partial or complete loss of company and personal data due to an operating system crash, errors, bugs, viruses, malware, and/or other software or hardware failures, or programming errors that render the device unusable.

  • National Rental Inc. reserves the right to take appropriate disciplinary action up to and including termination for noncompliance with this policy.

Employee Signature: ______________________

Date Signed: ______________________________

c:\users\caroline\appdata\local\microsoft\windows\temporary internet files\content.outlook\b6zyasoj\cab_logo.jpg (403) 475-2774

Share in:


Governance iconGovernance

Governance iconWhat are the objectives of it governance?

Governance icon2. What are the objectives of it governance?

Governance iconGovernance: By-law and Policies

Governance icon2. General Program Governance

Governance iconChapter 2- auditing it governance Controls

Governance iconChapter 2- auditing it governance Controls

Governance icon[Executive/Governance and Nominating] Committee

Governance iconImplementing Governance in SharePoint 2010

Governance iconChapter 2 Corporate Governance, Audit Standards

forms and shapes

When copying material provide a link © 2017