Cite Contribution
Community Manager
Shaju Tomy
Service

Hi, Need help in drafting \"Bring Your Own Device Policy\" or \"BYOD policy\". I need to draft it for a start-up e-commerce company. It would be great if you can share BYOD policy, if it exist in your company or any draft/guidelines you worked on. Looking forward to a quick response from all of you. Have a great day.
6th March 2013 From India, New Delhi
Dear Shaju Tomy,

You have already defined the scope for your policy. You have identified the limits to an extent. You need to define it further and set the terms for deviations. This will guide you to the escalation matrix .

Please identify the devices that you may need to consider , such as Iphone, Blackberry, Macbook, Laptops, Pen Drive, Hard Disk, extra internet connection, Scanner, Projector and so on. Identify the scope of requirement for these devices and what they need not do.

There must be a policy for Data security and management in your firm. Find the corresponding clause , such as if the official email box is set on Blackberry, what would you not be able to allow along with it ? Would you need the online VPN to be installed in the laptop or Macbook?

What are the work related software that needs to be uploaded ? It may include Workforce management, Data management or even Anti-Virus .

Once you set the specifications clear , set the guidelines for deviations. You don't own the device , hence will have the minimal control over it. Hence, stay focussed on the work related usage and security.

Identify the steps for audit and roles responsible for it. Reporting managers and IT staff to be precise. Let them know what they should be looking out for and declare it to the employees, the modes and standards for audit.

HR and Management Team can be the last level to take a decision on the deviations reported.

Here's discussion that might help you to frame the policy . Please consider sharing the lessons you learn from this implementation.

BYOD -Legal Perspective

Wish you all the best !
6th March 2013 From India, Mumbai
Thanks (Cite Contribution) for your inputs ....

************************************************** *******************

Dear Shaju Tomy,

You have already defined the scope for your policy. You have identified the limits to an extent. You need to define it further and set the terms for deviations. This will guide you to the escalation matrix .

Please identify the devices that you may need to consider , such as Iphone, Blackberry, Macbook, Laptops, Pen Drive, Hard Disk, extra internet connection, Scanner, Projector and so on. Identify the scope of requirement for these devices and what they need not do.

There must be a policy for Data security and management in your firm. Find the corresponding clause , such as if the official email box is set on Blackberry, what would you not be able to allow along with it ? Would you need the online VPN to be installed in the laptop or Macbook?

What are the work related software that needs to be uploaded ? It may include Workforce management, Data management or even Anti-Virus .

Once you set the specifications clear , set the guidelines for deviations. You don't own the device , hence will have the minimal control over it. Hence, stay focussed on the work related usage and security.

Identify the steps for audit and roles responsible for it. Reporting managers and IT staff to be precise. Let them know what they should be looking out for and declare it to the employees, the modes and standards for audit.

HR and Management Team can be the last level to take a decision on the deviations reported.
18th March 2013 From India, New Delhi
Add Reply Start A New Discussion

Cite.Co - is a repository of information created by your industry peers and experienced seniors. Register Here and help by adding your inputs to this topic/query page.
Prime Sponsor: TALENTEDGE - Certification Courses for career growth from top institutes like IIM / XLRI direct to device (online digital learning)





About Us Advertise Contact Us
Privacy Policy Disclaimer Terms Of Service



All rights reserved @ 2019 Cite.Co™