Typically crafted by the chief information officer (CIO) and other high-level IT decision-makers, a BYOD policy defines the terms under which employee-owned devices can be used at work. It also establishes the security policies that end users must observe while using them.
While the specifics of a BYOD policy vary depending on the goals of an organization’s BYOD strategy, most device policies define some variation of these elements:
Acceptable use: BYOD policies typically outline how and when employees can use personal devices for work-related tasks. For example, acceptable use guidelines might include information on securely connecting to corporate resources through a virtual private network (VPN) and a list of approved work-related apps.
Acceptable use policies often specify how sensitive company data must be handled, stored and transmitted by using employee-owned devices. Where applicable, BYOD policies might also include data security and retention policies that comply with regulations like the Health Insurance Portability and Accountability Act (HIPAA), the Sarbanes-Oxley Act and the General Data Protection Regulation (GDPR).
Permitted devices: A BYOD policy can outline the types of personal devices that employees can use for work purposes and relevant device specifications, such as minimum operating system version.
Security measures: BYOD policies typically set security standards for employees’ devices. These measures can include minimum password requirements and two-factor authentication policies, protocols for backing up sensitive information and procedures to be followed when a device is lost or stolen. Security measures can also specify security software that employees must install on their devices, such as mobile device management (MDM) or mobile application management (MAM) tools. These BYOD security solutions are discussed in further detail later.
Privacy and permissions: BYOD policies typically outline the steps that the IT department take to respect employee privacy on their devices, including how the organization maintains separation between employee's personal data and corporate data. The policy can also detail the specific permissions that the IT department needs on the employee’s device, including certain software that it might need to install and apps that it might need to control.
Reimbursement: If the company reimburses employees for using their personal devices—such as by offering a stipend for device purchases or subsidizing internet or mobile data plans—a BYOD policy outlines how reimbursement is handled. It also specifies the amounts that employees can receive.
IT support: The BYOD policy can specify the extent to which a company’s IT department will (or won’t) be available to help employees troubleshoot broken or improperly functioning personal devices.
Offboarding: Finally, BYOD policies typically outline the steps to follow when an employee leaves the company or unenrolls their device from the BYOD program. These exit procedures often include plans for removing sensitive corporate data from the device, revoking the device’s access to network resources and decommissioning the user or device account.