Warning: preg_match(): Unknown modifier 'g' in [path]/showthread.php on line 2297

Warning: preg_match(): Unknown modifier 'g' in [path]/showthread.php on line 2298

Warning: preg_replace(): Empty regular expression in [path]/showthread.php on line 2381

Warning: preg_replace(): Empty regular expression in [path]/showthread.php on line 2381

Warning: preg_replace(): Empty regular expression in [path]/showthread.php on line 2381
BYOD Policy - CiteHR

No Tags Found!

SH

Shai89308

Executive Hr

AS

Ammu Shanvi

Human Resource

GS

G SHASHI KRISHNA

Senior Manager - Hr

AH

Aizant HR

Human Resources

MA

MARSHAL

Safety Officer

AK

Anish Katoch

Hr Executive

PR

PranjalR

Hr Recruiter

AP

Alka Pal

Hr Executive

Karthikeyan8195

Management Consultant

MK

Mohit Kumar Puri

Head Marketing

AU

Austex

Accounts Manager


Shaju Tomy
Hi, Need help in drafting \"Bring Your Own Device Policy\" or \"BYOD policy\". I need to draft it for a start-up e-commerce company. It would be great if you can share BYOD policy, if it exist in your company or any draft/guidelines you worked on. Looking forward to a quick response from all of you. Have a great day.
From India, New Delhi
Cite Contribution
1856

Dear Shaju Tomy,

You have already defined the scope for your policy. You have identified the limits to an extent. You need to define it further and set the terms for deviations. This will guide you to the escalation matrix .

Please identify the devices that you may need to consider , such as Iphone, Blackberry, Macbook, Laptops, Pen Drive, Hard Disk, extra internet connection, Scanner, Projector and so on. Identify the scope of requirement for these devices and what they need not do.

There must be a policy for Data security and management in your firm. Find the corresponding clause , such as if the official email box is set on Blackberry, what would you not be able to allow along with it ? Would you need the online VPN to be installed in the laptop or Macbook?

What are the work related software that needs to be uploaded ? It may include Workforce management, Data management or even Anti-Virus .

Once you set the specifications clear , set the guidelines for deviations. You don't own the device , hence will have the minimal control over it. Hence, stay focussed on the work related usage and security.

Identify the steps for audit and roles responsible for it. Reporting managers and IT staff to be precise. Let them know what they should be looking out for and declare it to the employees, the modes and standards for audit.

HR and Management Team can be the last level to take a decision on the deviations reported.

Here's discussion that might help you to frame the policy . Please consider sharing the lessons you learn from this implementation.

BYOD -Legal Perspective

Wish you all the best !

From India, Mumbai
Shaju Tomy
Thanks (Cite Contribution) for your inputs ....

************************************************** *******************

Dear Shaju Tomy,

You have already defined the scope for your policy. You have identified the limits to an extent. You need to define it further and set the terms for deviations. This will guide you to the escalation matrix .

Please identify the devices that you may need to consider , such as Iphone, Blackberry, Macbook, Laptops, Pen Drive, Hard Disk, extra internet connection, Scanner, Projector and so on. Identify the scope of requirement for these devices and what they need not do.

There must be a policy for Data security and management in your firm. Find the corresponding clause , such as if the official email box is set on Blackberry, what would you not be able to allow along with it ? Would you need the online VPN to be installed in the laptop or Macbook?

What are the work related software that needs to be uploaded ? It may include Workforce management, Data management or even Anti-Virus .

Once you set the specifications clear , set the guidelines for deviations. You don't own the device , hence will have the minimal control over it. Hence, stay focussed on the work related usage and security.

Identify the steps for audit and roles responsible for it. Reporting managers and IT staff to be precise. Let them know what they should be looking out for and declare it to the employees, the modes and standards for audit.

HR and Management Team can be the last level to take a decision on the deviations reported.

From India, New Delhi
Find answers from people who have previously dealt with business and work issues similar to yours - Please Register and Log In to CiteHR and post your query.




About Us Advertise Contact Us Testimonials
Privacy Policy Disclaimer Terms Of Service

All rights reserved @ 2024 CiteHR ®

All Copyright And Trademarks in Posts Held By Respective Owners.