T1.2.4 - ACCEPTABLE BRING YOUR OWN DEVICE (BYOD) ARRANGEMENTS Implementation Guidanace
The entity shall develop rules for the acceptable use of information assets associated with BYOD arrangements.
Back to T1.2.4 - P2 - ACCEPTABLE BRING YOUR OWN DEVICE (BYOD) ARRANGEMENTS
All employees, contractors and third party users should follow rules for the acceptable use of information and assets associated with BYOD arrangements, including:
- A. Rules for phone, electronic mail and Internet usages
- B. Rules for protection of the device from unauthorized access (e.g. pin code)
- C. Rules for storing and / or encrypting personal and entity information
- D. Clear separation of personal data and entity’s data
It is recommended to ensure a complete split of personal and entity information by technical means.
Back to T1.2.4 - P2 - ACCEPTABLE BRING YOUR OWN DEVICE (BYOD) ARRANGEMENTS