SecAware materials

SecAware logo 150 animated ezgif.gif

~3-page information security policy template on Bring Your Own Device.


Employees who prefer to use their own IT equipment, devices or IoT things for work purposes must be duly authorized under the corporate BYOD scheme.  Authorization is at management’s discretion, and various security controls and constraints are required to mitigate the additional information risks, relative to using IT equiment supplied, supported and maintained by the organisation.


Delivered as an editable MS Word document, easily customized for your organization's specific needs.

BYOD policy