SPRING DISCOUNT
Get 30% off on toolkits, course exams, and Conformio yearly plans.
Limited-time offer – ends April 25, 2024
Use promo code:
SPRING30

Expert Advice Community

Guest

BYOD Policy

  Quote
Guest
Guest user Created:   Jun 09, 2018 Last commented:   Jun 09, 2018

BYOD Policy

I’m working on “08.4_Bring_Your_Own_Device_BYOD_Policy_EN” policy. I’m having a bit of a hard time to compile a list of acceptable and prohibited devices/setting/applications.
0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Expert
Rhand Leal Jun 09, 2018

Do you happen to have some examples or a list for some ideas what to put here?

[List of acceptable BYOD devices and their settings]
[List of prohibited BYOD applications]

Answer: For BYOD devices you should consider any asset your employees can bring to work premises (e.g., cellphones, tablets, and notebooks).

For allowed settings you should consider configurations that can improve information protection (e.g., "storage encryption" and "screen locking" should be enabled). For prohibited settings, you should consider configurations that may compromise information storage or processing on the device (e.g., "Bluetooth connections" and "local password storage" should be disabled).

Examples of prohibited applications are unlicensed software, and software no t related to work, even if they have license (e.g., games).

It is important to note that the creation of those lists are defined in sections 3.2, 3.3, and 3.4 of the BYOD Policy, not only in section 4.

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Jun 09, 2018

Jun 09, 2018