~3-page information security policy template on Bring Your Own Device.
Workers who prefer to use their own IT equipment, devices or IoT things for work purposes must be duly authorised under the corporate BYOD scheme. Authorisation is at management’s discretion, and various security controls and constraints are required to mitigate the additional information risks, relative to using IT equipment supplied, configured, supported and maintained by the organisation.
Supplied as an MS Word document, readily customised for your organisation's specific situation.
top of page
bottom of page