4½-page information security policy on Bring Your Own Device.
Workers who prefer to use their own Information Technology equipment, devices or things for work purposes must be duly authorized by management through the corproate BYOD scheme. Authorization is at management’s discretion, and various security controls and constraints are required to mitigate the additional information risks arising from BYOD.
Delivered as an editable MS Word document, easily customized for your organization's specific needs.
BYOD security policy
Template policy on BYOD security
See also the policies on:
The license covers internal use within a single organisation. Please get in touch if you'd like to incorporate the SecAware content in your systems or services provided to third parties.