Following the resignation or termination of the employment relationship or at any time upon request, the employee may be asked to submit the personal device to the inspection. All company data on personal devices is removed from IT after the termination of the working relationship. This document contains policies, standards and rules of conduct (ROB) for the use of smartphones and/or tablets in possession of mobile phones of agency names (hereafter referred to as users) for access to network resources of agency names. Access and continued use of network services is granted on the condition that each user reads, signs, respects and respects the agency`s name policies regarding the use of these devices and services. Management reserves the right to verify or retain personal and business-related data on personal devices or to pass it on to government authorities or third parties during an investigation or litigation. Management can verify the activity and analyze usage patterns and publish this data to ensure that [company name] resources are used in these areas in accordance with this directive. In addition, no staff member can knowingly disable network software or systems identified as a monitoring tool. Bring Your Own Device (BYOD) Programs require three critical elements: a software application for managing network-connected devices, a written policy that defines the responsibilities of the employer and the user, and an agreement that users must sign by acknowledging that they have read and understood the policy. This directive is intended to protect the security and integrity of XYZ`s data and technology infrastructure. Derogations from the directive may be limited due to discrepancies between devices and platforms. XYZ employees must accept the conditions set out in this directive in order to connect their devices to the business network. Family and friends should not use personal devices used for commercial purposes. A “Bring Your Own Device” directive defines the company`s rights to determine how data should be used and protected, including the period during which the employee no longer works for the company.
It defines the rights and obligations between employees and the company, including the right of the company to access the employee`s device for security reasons. The policy also defines the procedure for terminating the employment relationship and the disciplinary consequences in the event of an infringement. To ensure the security of information [company name], authorized employees must install antivirus and MDM software on their personal mobile devices. This MDM software records all company-related information, including calendars, emails and other applications, in a password-protected and secure area. The [Company Name] IT department must install this software before using the personal device for work purposes. Expectation of privacy: The Agency`s name respects the privacy of your personal device and only requires technicians to access the device to carry out security checks, as described below, or to respond to legitimate investigative requests arising from administrative, civil or criminal proceedings (only if the user downloads emails/state documents on his or her personal device). This is different from the state`s equipment/services policy, in which government employees do not have the right to privacy in the use of public equipment or services and should not have expectations. While access to the personal device is limited, the Agency`s name codes and rules of conduct remain in effect with respect to the use/access of government emails and other public services/services.