© 2019 IsecT Limited, New Zealand      Get in touch

4½-page information security policy on Bring Your Own Device.


Employees who prefer to use their own Information and Communications Technology equipment, devices or things for work purposes must be duly authorized under the BYOD scheme.  Authorization is at management’s discretion, and various security controls and constraints are required to mitigate the additional information risks arising from BYOD.


Delivered as an editable MS Word document, easily customized for your organization's specific needs.

BYOD security policy

  • Template policy on BYOD security


    See also the policies on:

    • Cryptography
    • Malware
    • Backups and archives
    • Portable ICT security
    • IoT Internet of Things security
    • Network and cloud security
    • Physical security
    • Information ownership