Create Acceptable Use Policy for Your BYOC Program

John Storts
Slide Show

Creating a Bring Your Own Technology (BYOT) Program

12 steps to follow when creating a BYOT program.

Thanks to the unstoppable rise of mobile technology, companies are increasingly allowing IT workers to use personal devices (often called "bring-your-own-computer/BYOC" or "bring-you-own-technology/BYOT" programs) to access business networks and data.


While this level of flexibility makes productivity gains and cost reductions possible and allows for some freedom of choice for employees, it also presents security risks. These devices can be difficult to manage and secure and very easy to lose or steal.


Info-Tech Research Group aims to minimize security risks and standardize rules and procedures for BYOC programs with the BYOC Acceptable Use Policy Template. This policy template helps you define acceptable use for mobile devices like smartphones, tablets, laptops and netbooks that connect to company networks to access data. It covers:

  • Policy applicability
  • Minimum requirements for devices
  • Stipend amounts
  • Rules of use
  • Software and hardware support agreements


Make sure that devices used as part of your BYOC program keep private and confidential data protected.


Related Content

The Role of IT in the BYOT Era

Hot Tablets Don't Take the Traditional IT Route into the Enterprise

More Good Advice on BYOT Programs

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.