SecAware materials

SecAware logo 150 animated ezgif.gif

4½-page information security policy on Bring Your Own Device.


Workers who prefer to use their own Information Technology equipment, devices or things for work purposes must be duly authorized by management through the corproate BYOD scheme.  Authorization is at management’s discretion, and various security controls and constraints are required to mitigate the additional information risks arising from BYOD.


Delivered as an editable MS Word document, easily customized for your organization's specific needs.

BYOD security policy