[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-byod\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-byod\/","headline":"The Ping: BYOD","name":"The Ping: BYOD","description":"ShareTweet What\u2019s a Bee-YOD (BYOD)? What is a BYOD anyway? The next hipster dog breed? BYOD stands for Bring Your Own Device. You\u2019ll normally see this term used in reference to devices that are brought into your office by your employees and contractors. If you haven\u2019t addressed it yet then now is the time! One [&hellip;]","datePublished":"2018-03-01","dateModified":"2018-03-07","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"126","width":"300"},"url":"https:\/\/univista.com\/posts\/the-ping-byod\/","about":["android","compliance","iPhone","Security","The Ping"],"wordCount":595,"articleBody":"ShareTweet                                        What\u2019s a Bee-YOD (BYOD)?What is a BYOD anyway? The next hipster dog breed?BYOD stands for Bring Your Own Device. You\u2019ll normally see this term used in reference to devices that are brought into your office by your employees and contractors.If you haven\u2019t addressed it yet then now is the time! One of your most important business assets, your data, is walking out the door every day on your employee\u2019s phones. Until you get a grip on how this data is being handled your business is at risk.\u00a0What\u2019s in a good BYOD policy?You can get a grip on your data by creating a Bring Your Own Device Policy. This policy addresses things like how your employees can use their phones while working and what data can be stored on their phones. It also can specify what you can do to their phone if an employee leaves your company.These are all sensitive issues so it\u2019s important to be very careful when creating your BYOD policy. The BYOD policy is a balancing act between protecting your business assets and infringing into your employees\u2019 personal space.&nbsp;SAMPLE BYODEMPLOYEE must agree to the terms and conditions set forth in this policy in order to be able to connect their devices to the THE COMPANY network and databases.Acceptable UsePersonal devices that run Apple iOS, Google Android, or Microsoft Windows are allowed.Lost or stolen devices must be reported to THE COMPANY within 24 hours. The EMPLOYEE is responsible for notifying their mobile carrier immediately upon loss of a device.THE COMPANY allows any personal use of EMPLOYEE-owned devices during business hours as long as the device does not distract the EMPLOYEE. It is up the supervisor of the EMPLOYEE to determine if personal use of devices is causing a detrimental effect on the employee\u2019s productivity.The EMPLOYEE is expected to use his or her devices in an ethical manner at all times.The EMPLOYEE should install Webroot on any devices covered by THE COMPANY\u2019s BYOD policy. THE COMPANY will provide this software at no additional cost to the employee.SecurityWritten approval must be given before any EMPLOYEE -owned device will be allowed to connect to any\u00a0COMPANY-owned system.The device must lock itself with a password if it\u2019s idle for no more than two minutes.After five failed login attempts, the device must lock and erase.The Employee\u2019s device may be remotely wiped if:The device is lostIT detects a data or policy breach, a virus or similar threat to the security of THE COMPANY\u2019s data and technology infrastructure on the Employee\u2019s personal device.Risks\/LiabilitiesWhile THE COMPANY will take every precaution to prevent the Employee\u2019s personal data from being lost in the event it must remote wipe a device, it is the Employee\u2019s responsibility to take additional precautions, such as backing up email, contacts, etc.THE COMPANY reserves the right to revoke these privileges if users do not abide by THE COMPANY Acceptable Use policies for safeguarding information and proper usage.The employee assumes full liability for risks including, but not limited to, the partial or complete loss of company and personal data due to an operating system crash, errors, bugs, viruses, malware, and\/or other software or hardware failures, or programming errors that render the device unusable.&nbsp;If you need help creating a BYOD policy then please give us a call at 512-832-6209. We\u2019re here to help.&nbsp;ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: BYOD","item":"https:\/\/univista.com\/posts\/the-ping-byod\/#breadcrumbitem"}]}]