dcsimg

Create Acceptable Use Policy for Your BYOC Program

John Storts
Slide Show

Creating a Bring Your Own Technology (BYOT) Program

12 steps to follow when creating a BYOT program.

Thanks to the unstoppable rise of mobile technology, companies are increasingly allowing IT workers to use personal devices (often called "bring-your-own-computer/BYOC" or "bring-you-own-technology/BYOT" programs) to access business networks and data.

 

While this level of flexibility makes productivity gains and cost reductions possible and allows for some freedom of choice for employees, it also presents security risks. These devices can be difficult to manage and secure and very easy to lose or steal.

 

Info-Tech Research Group aims to minimize security risks and standardize rules and procedures for BYOC programs with the BYOC Acceptable Use Policy Template. This policy template helps you define acceptable use for mobile devices like smartphones, tablets, laptops and netbooks that connect to company networks to access data. It covers:

  • Policy applicability
  • Minimum requirements for devices
  • Stipend amounts
  • Rules of use
  • Software and hardware support agreements

 


Make sure that devices used as part of your BYOC program keep private and confidential data protected.

 

Related Content

The Role of IT in the BYOT Era

Hot Tablets Don't Take the Traditional IT Route into the Enterprise

More Good Advice on BYOT Programs


Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.




Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.


×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.