Byod Employee Agreement

Following the resignation or termination of the employment relationship or at any time upon request, the employee may be asked to submit the personal device to the inspection. All company data on personal devices is removed from IT after the termination of the working relationship. Employees of [company name] may be able to use their personal electronic devices for work purposes if they have been authorized in writing, in advance by staff and management. Personal electronic devices include mobile phones, smartphones, tablets, laptops and computers. To ensure the security of information [company name], authorized employees must install antivirus and MDM software on their personal mobile devices. This MDM software records all company-related information, including calendars, emails and other applications, in a password-protected and secure area. The [Company Name] IT department must install this software before using the personal device for work purposes. Employees may be disciplined until the termination of employment for damages intentionally caused by the employee. This directive sets out guidelines for [the name] for the use of personal electronic devices for work-related purposes. Excessive personal calls, emails or text messages during the work day, regardless of the device used, can affect staff productivity and distract others. Staff should deal with personal matters during periods of absence from work and ensure that friends and family members are informed of the directive. Exceptions can be made in an emergency and approved in advance by management.

Managers reserve the right to request employees` mobile phone bills and to use reports for calls and messages during working hours to determine if the use is excessive. XYZ gives its employees the privilege of buying and using the smartphones and tablets of their choice at work. XYZ Reserves the right to revoke this authorization if users do not comply with the following policies and procedures. Writing a BYOD policy forces companies to think before letting their employees go onto the organization`s network with their own smartphones and tablets. Issues that need to be addressed by company management during the planning phase include: which browsers should employees use? What security tools offer the best protection for the many devices that can connect to the network? What support does IT need to provide? To ensure that nothing is overlooked, you get contributions from employees throughout the company: HR, IT, accounting, law – workers and executives. To secure the company`s sensitive data, employees must have software from the “Wipe remote” computer division installed on their personal devices before using the devices for work purposes. This software allows the remote removal of company-related data in the event of loss or theft of the device. Removing company data can affect other applications and data.

All employees must use a pre-defined ringtone and a warning for corporate messages and calls.