Skip Links

A sampling of BYOD user policies

Here are several actual BYOD policies that you can use as the framework for your own policy

By Sandra Gittlen, Network World
April 02, 2012 07:08 AM ET

Page 7 of 7

6.6 International Business Travel

6.6.1 The IT Help Desk maintains international Blackberry devices for temporary use during international business travel. Employee-Owned Smartphone Program users are encouraged to use these devices for international business travel to avoid high international roaming charges on personal mobile bills.

6.6.2 Charges incurred on an Employee-Owned Smartphone Program user's personal device during international business travel may be expensed at his or her manager's discretion. Employee-Owned Smartphone Program users are encouraged to check with their managers before international business travel to determine whether it will be acceptable to expense international charges.

6.7 License Limitation

6.7.1 The company will license one (1) personal device for company email/calendar/contacts per participating Employee-Owned Smartphone Program user.

6.7.2 Additional licenses will be based on business need and will require CIO approval.

6.8 Mobile Number Porting/Transferring

6.8.1 Upon request, the company will port an existing company mobile number to an Employee-Owned Smartphone Program user whose smartphone is registered to another mobile carrier; alternatively the company will transfer liability for the number from the company to an Employee-Owned Smartphone Program user using the same carrier. In both cases, the mobile number liability will transfer from the company to the Employee-Owned Smartphone Program use, and in both cases the company will absorb the port/transfer fee.

6.9 The Company Email/Calendar/Contacts App

6.9.1 To enable corporate email/calendar/contacts on an Employee-Owned Smartphone Program user's personal device, the company will use a secure communications app.

6.9.2 Once a participating employee installs the secure communications app on his or her iPhone or Android device and the app is configured, all corporate email/calendar/contacts will reside within the secure communications app.

6.9.3 The company will manage the configuration of the secure communications app, but the company has no access to any data residing on a participating employee's personal device.

6.10 Rooted or Jailbroken Devices

6.10.1 Rooted Android devices and jailbroken Apple iOS devices pose a risk to company data contained within the secure communications app. Therefore, the company will disable or remove the app and remove company data on devices determined to be rooted or jailbroken.

Read more about wireless & mobile in Network World's Wireless & Mobile section.

Our Commenting Policies
Latest News
rssRss Feed
View more Latest News