BYOD Policy - Department of Finance, Services and Innovation

advertisement
<agency>
Bring your Own Device (BYOD)
Policy
December 2013
<agency> BYOD Policy
CONTENTS
1.
2.
3.
OVERVIEW
3
1.1
Introduction and purpose
3
1.2
Scope and application
3
1.2
Reference documents
3
POLICY
4
2.1
Definitions
4
2.2
Terms and conditions of use
4
REQUIREMENTS
5
3.1
Bring your own device minimum requirements
5
3.2
Device Registration, Configuration and Management
6
3.3
Device Usage, Support and Costs
7
3.4
Protection of Agency data on your BYOD
9
3.5
Device Deregistration
DOCUMENT CONTROL
10
11
2
<agency> BYOD Policy
1.
OVERVIEW
1.1
Introduction and purpose
Technology is part of the everyday life of the modern public sector worker. Consumer technology is
evolving quickly and is often more advanced than the technology available in the workplace.
Employees increasingly prefer to use their own smartphones, tablets and other devices to access
corporate information. Empowering them to do so supports greater workplace mobility and
flexibility.
The purpose of this policy is twofold. Firstly, it aims to allow you ‘bring your own device’ (BYOD) for
business purposes. If your device is registered as a BYOD, you will be able to access <agency>’s
programs when and where you need to do so. Secondly, the policy aims to ensure that <agency>’s
systems and data are protected from unauthorised access, use or disclosure.
This BYOD Policy has been informed by the NSW Government Mobility Solutions Framework. The
Framework assists NSW Government agencies to define their agency specific mobility strategy and
approach.
1.2
Scope and application
This document sets out the terms of use for BYOD within <agency>. The policy applies to all
employees of <agency>, including permanent and temporary staff, contractors and employees of
<agency>’s partner organisations.
It affects any device or accompanying media that you may use to access the systems and data of
<agency>, whether they are used within or outside your standard working hours.
1.2
Reference documents
This policy supplements the <agency>’s <acceptable use policy name>.
You should also have regard to the following statutory rules, policy documents and standards. They
provide direct or related guidance for the use of technology and the collection, storage, access, use
and disclosure of data by NSW public sector agencies:
















AS/NZS ISO 31000 Risk management - Principles and guidelines
Electronic Transactions Act 2000
Government Information (Information Commissioner) Act 2009
Government Information (Public Access) Act 2009
Health Records and Information Privacy Act 2002
M2012-15 Digital Information Security Policy
NSW Government Open Data Policy
NSW Government Cloud Services Policy and Guidelines
NSW Government ICT Strategy NSW Government ICT Technical Standards – Mobility Framework
NSW Government Social Media Policy and Guidelines
TPP 09-05 - Internal Audit and Risk Management Policy for the NSW Public Sector
Privacy and Personal Information Protection Act 1998
Public Finance and Audit Act 1983
Public Interest Disclosures Act 1994
NSW Procurement: Small and Medium Enterprises Policy Framework
State Records Act 1998
3
<agency> BYOD Policy
2.
POLICY
2.1
Definitions
Application – Computer software designed to assist end users to carry out useful tasks. Examples of
applications may include the Microsoft Office suite of products or smartphone applications such as
Google Maps.
Bring Your Own Device (BYOD) - Any electronic device owned, leased or operated by an employee
or contractor of <agency> which is capable of storing data and connecting to a network, including
but not limited to mobile phones, smartphones, tablets, laptops, personal computers and
netbooks. The accepted types of BYOD are listed in the Acceptable Device Types document
attached to this policy.
Data - Any and all information stored or processed through a BYOD. <agency’s> data refers to data
owned, originating from or processed by <agency>’s systems.
Device hygiene - BYOD must have appropriate and up-to-date ‘hygiene’ solutions installed. Device
hygiene includes anti-virus, anti-spam and anti-spyware solutions. Minimum requirements - The
minimum hardware, software and general operating requirements for a BYOD.
Mobile Device Management (MDM) – Solution which manages, supports, secures and monitors
mobile devices. <Note: <Agency> will conduct risk assessments to determine whether their
environment requires the implementation or not of such a solution. Implementation should ideally
be done ‘as a Service’ in accordance with NSW Government policy>.
Mobility Framework – The NSW Government Mobility Solutions Framework. The Framework
provides information and technical guidance to agencies when procuring mobility solution services.
Personal information – ‘Personal information’ is defined by s 6(1) of the Privacy and Personal
Information Protection Act 1988 (NSW):
Information or an opinion (including information or an opinion forming part of a database and
whether or not recorded in a material form) about an individual whose identity is apparent or can
reasonably be ascertained from the information or opinion.
Wipe – A security feature that renders the data stored on a device inaccessible. Wiping may be
performed locally, via an MDM product, or remotely by a network administrator.
2.2
Terms and conditions of use
The purpose of this policy is to allow you to use a BYOD if you wish to do so, while also ensuring you
take steps to minimise the risk of unauthorised access to <agency>’s systems or unauthorised use
or disclosure of the data held by <agency>.
You must review and accept this policy before using any BYOD. Your agreement to the
requirements of this policy is indicated by your <signature/acceptance> of the
<attached/electronic> BYOD Acceptance Form.
Acceptance indicates agreement to the following standard terms:

Acceptable BYOD: Any device may be considered for use as a BYOD providing it meets the
minimum requirements set out in this document. In general, an acceptable BYOD would be one of
the devices listed in the document referenced in the definition at part 2.1 of this policy.
4
<agency> BYOD Policy

Minimum requirements: The burden of proof for meeting minimum requirements rests with you,
the requestor. The final decision on whether your device meets our requirements is subject to the
approval of <title of approver>.

Matching our requirements and your work needs: BYOD capabilities and device profiles must
match <agency>’s requirements as well as the scenarios where you need to use a device for work.
For example, if you are usually a consumer of information when mobile, the profile of a tablet or
smartphone would be a good match. If you are a “creator” of information, a laptop or desktop
profile would be a better match.

Authority: You agree to provide limited authority over the device for the sole purpose of protecting
agency data and access on the device. This authority includes permission to wipe the device in the
event of loss or disposal. This may include personal data, address books and e-mail depending on
the data classification of information locally stored, the device and whether an MDM tool is used.
The authority is to remain in place from the time the device is registered until it is deregistered.
<Non MDM option> You should also provide your device to <relevant ICT contact> for a manual
check when you cease employment. You may be present at the time the device is manually
checked. >

Security: You are responsible for ensuring that your personal device is adequately secured
against loss, theft or use by persons not authorised to use the device.

Support: You are responsible for replacing, maintaining and arranging technical support for your
BYOD. <Agency> will only provide hardware, operating system or application support for the
applications that <agency> has provided.

Access at <agency>’s discretion: Access to <agency>’s systems and data is provided at the sole
discretion of <agency>. Your access may be revoked at any time and for any reason.

Enforcement: All breaches of this policy will be treated seriously. If you are found to have been in
breach you may be subject to disciplinary action.
3.
REQUIREMENTS
3.1
Bring your own device minimum requirements
The table below summarises <agency>’s minimum requirements for BYOD. You should read this
table with the explanatory text in the rest of this section (3.1).
Function
Minimum requirement
Configuration management
Operating systems

Your device must use a legitimate operating system that
meets the defined minimum standards (i.e. you may not
use a ‘jail broken’ device).
Network
authentication

The minimum network authentication is subject to agency’s
local requirements, e.g. the agency’s End User Environment
Directory Service with a minimum two factor
authentication required for external, 3G or internet access.
Password protection/
User authentication

Your device will support password authentication and
automatic locking that must be used at all times.
5
<agency> BYOD Policy
Automatic device lock

Your device must have the automatic lock enabled.
Device hygiene

Your device must have appropriate and up to date
‘hygiene’ solutions installed.
Lost and stolen
devices

If your device is lost or stolen you must report the loss or
theft immediately to the ICT Service Desk.
Mobile device
disposal

Any agency data on your device will be removed from the
device at the end of its use within the agency environment.
Software licensing

Operating systems and applications running on or required
by BYOD will be your sole responsibility as the device
owner.

<Agency> will conduct a risk assessment of the nature of
services to be offered to mobile devices and specifically to
BYOD. A risk assessment needs to be undertaken by
<Agency> to determine whether an MDM platform is
required to meet its security requirements. Note: If an
MDM platform is to be used, insert details in this section
BYOD authority

If your device is registered and used for BYOD, you agree to
surrender limited authority over the device for the sole
purpose of protecting agency data and access on the
device.
Mobile device
application control

If <Agency> has implemented a MDM solution, it has the
ability to push and remove our supplied applications from
your device to enhance its security or manageability.
Device support

You and the device issuer are responsible for supporting
your device.
Security management
Mobile device
management
Service management
3.2
Device Registration, Configuration and Management

Your BYOD must be registered before connecting to any <Agency> internal IT service.

A limit will apply to the number of devices that can be registered. <MDM option> The device must
be registered by connecting to <Agency> BYOD management service

<Non-MDM option> The device must be registered in accordance with <Agency> BYOD
requirements
MDM option

The device must be registered by connecting to <Agency> BYOD management service.
Non-MDM option

The device must be registered in accordance with <Agency> BYOD requirements.
6
<agency> BYOD Policy

You acknowledge that <Agency> will <non MDM option> directly and or <MDM option> remotely
change security configurations of the device to protect <Agency> data and software stored on the
device. These changes may include but are not limited to:
o
Refusal to register a device that fails minimum requirements (outlined above) or that
currently has installed banned software and services listed at <web link>.
o
Configuring certain security settings
o
<MDM option> Preventing the user from changing certain security settings
o
Applying a login code with an acceptable level of complexity to enable secure access to the
device
o
Automatically locking the device after an inactive timeout period (you will need to re-enter
the login code)
o
Installing software and digital certificates necessary to maintain security
o
Encrypting data stored on the device
o
<MDM option> Automatically wiping (either all code and data OR all agency code and data)
depending upon Agency MDM, device capabilities and specific requirements from the
device after a specific number of failed login attempts
o
<MDM option> Should any <Agency> configurations be removed that are required for
proper use of the device with Agency systems, these will be re-applied or access to
<Agency> systems, information and data will be prevented if the configurations cannot be
maintained.

You acknowledge that any <Agency> data stored on the BYOD remains the sole property of
<Agency and/or NSW Government> and that you have an obligation to protect the security of the
data.

You acknowledge that <Agency> has a right to inspect <Agency> data held on your personal BYOD.
MDM Option

The device must be registered at: <weblink to Agency MDM solution>
Non-MDM Option

The device must be registered in accordance with <Agency> BYOD requirements.

<MDM option> You understand that <Agency> may remotely monitor your device to ensure
security and software configurations are maintained.

<MDM option> You will not be prevented from installing the software or applications of your
choice on your device. However, <Agency> may block your access to <Agency> internal IT services if
any software/applications/data present a threat to <Agency> IT services, information or data.
3.3
Device Usage, Support and Costs

The service and its use are at your sole discretion and risk.
7
<agency> BYOD Policy

<Agency> does not impose a charge on you for registering your device.

You are responsible for supporting your device. <Agency> will only provide support for the
applications <agency> has provided.
Support
BYOD
Physical provisioning
Device owner
Replacement of defective/damaged device
Device owner
Operating system support including licensing
Device owner
Application support of device including licensing
Device owner
Agency provided/supported mobile applications
Agency service desk
Agency provided/supported thin-client applications
Agency service desk
Device connectivity / access
BYOD
Mobile internet
Device owner
Home internet / broadband
Device owner
VPN client
Agency service desk
Agency wireless
Agency service desk

<Subject to agency requirements/internal policy: <Agency> is not responsible for any costs incurred
by your use of your BYOD. <Agency> will not reimburse any voice or data charges, software or
application acquisition fees, support or insurance costs associated with your device except in
exceptional circumstances such as excessive business requirements.

<Agency> is not responsible for any inconvenience that you may experience in connection with
using <Agency> internal IT services on your BYOD.

You have sole responsibility for ensuring no other person has access to <Agency> software or data
stored on your BYOD.

<Agency> will not monitor the phone call or text message history of a BYOD. Where needed (for
example, in the case of a disciplinary matter) the call and text messages may be requested.

<Agency> will not monitor the web browser history on your BYOD when not connected to
<Agency> network(s).

<Agency> may restrict access to internet websites, services or other elements for operational or
policy reasons while your BYOD is connected to <Agency> networks including either wireless or
cabled connections.
 <Agency> may monitor your use of your BYOD while it is connected to <Agency> network. This
information may be collected and archived and may be subject to public access.
 You are responsible for abiding by all licence terms and conditions applicable to any software, apps,
data or information provided by <Agency> to your BYOD.
 You acknowledge that your use of a BYOD may involve <Agency>:
o
Preventing you from accessing <Agency> internal IT services
8
<agency> BYOD Policy
o
Locking your device
o
Wiping personal data from your device in accordance with the following circumstances:

Your BYOD is reported as being lost/stolen to <Agency> <MDM option>

You cease employment/contract with <Agency>

There is a suspected security breach, examples include but are not limited to,
modification of the device’s operating system, breaching <Agency> policies, or
detection of viruses or malware on the device <MDM option>

<Agency> may lock your device to prevent access to <Agency> information or data.

Preventing your device from connecting to <Agency> internal IT services.

Applying either a full or selective wipe of your BYOD <MDM option>.

Applying a manual selective wipe of your BYOD <non MDM option>.

Should you fail <number> times in a row to enter a correct login password for your
BYOD, a full wipe may be performed automatically on the device <MDM option>.
 While <Agency> will make all reasonable effort to ensure service is available <agency> does not
guarantee that access to <Agency> internal IT services, information or data will be available at all
times.
 If your BYOD is lost or stolen, you are responsible for reporting the event as soon as practicable to
<Agency> Service Desk on <phone number>. You must also:
o
undertake a device wipe as soon as practicable via <Agency MDM portal> <MDM option>
or via personal configuration utility <non MDM option>.
o
take reasonable steps to ensure that it is replaced as quickly as possible.
 <Subject to agency requirements> <Agency> will also provide you with a loan device so that you are
able to carry out your normal work activities.
3.4
Protection of Agency data on your BYOD
 <Agency> information, documents, and data classified as <insert> or that are subject to legal or
professional privilege must not be stored on BYODs and/or unapproved cloud-based services.
 <Agency> data must only be backed up to approved locations either within agency systems or
approved cloud service locations or providers.
 <Subject to agency requirements> You should check your device to ensure that automated cloud
backup is disabled.
 <Subject to agency requirements> You should take reasonable steps to reduce the risk of losing
your personal data. You may, for example, store your personal data separately from <Agency> data
through file partitions or using a separate memory card.
 You are responsible for backing up and restoring the data and configuration settings of your BYOD.
Personal data is not to be backed up to or stored by <Agency>. <Agency> is not responsible for any
personal loss or damage you may suffer by actions undertaken by <Agency> to protect <Agency>
data stored on your BYOD.
9
<agency> BYOD Policy
3.5
Device Deregistration
 <Agency> at its own discretion, may deregister any BYOD at any time without warning.
 <Agency> may deregister a BYOD that has not consumed <Agency> internal IT services for more
than <insert> months.
MDM Option

You can deregister your BYOD at any time by visiting <MDM portal>.
Non-MDM Option

The device must be de-registered in accordance with <Agency> BYOD requirements.
 You acknowledge that by deregistering your BYOD:
MDM Option
o
<Agency> will remove all <Agency> data, applications and security controls.
Non-MDM Option
o
You will need to present your BYOD to <Agency> Service Desk for inspection and
removal of all <Agency> data, applications and security controls.
 You will no longer be able to connect to <Agency> internal IT systems and data, unless the device is
re-registered.
 You are encouraged to remove any personal data if you are intending to dispose of your BYOD. If
you intend to sell or gift the device to another person you should ensure that it is wiped.
10
<agency> BYOD Policy
DOCUMENT CONTROL
Document history
Status: Draft
Version: 0.3
Approved by: <governance/approval body>
Approved on:
Contact: John Thomas, Director, ICT Services, Department of Finance and Services
Email: john.thomas@services.nsw.gov.au
Telephone: (02) 9372 8286
Review date
This Policy will be reviewed in six months from the date of this version and on an annual basis thereafter.
11
Download