Thanks to the unstoppable rise of mobile technology, companies are increasingly allowing IT workers to use personal devices (often called "bring-your-own-computer/BYOC" or "bring-you-own-technology/BYOT" programs) to access business networks and data.
While this level of flexibility makes productivity gains and cost reductions possible and allows for some freedom of choice for employees, it also presents security risks. These devices can be difficult to manage and secure and very easy to lose or steal.
Info-Tech Research Group aims to minimize security risks and standardize rules and procedures for BYOC programs with the BYOC Acceptable Use Policy Template. This policy template helps you define acceptable use for mobile devices like smartphones, tablets, laptops and netbooks that connect to company networks to access data. It covers: