Assignment Task 2: BYOD Acceptable Use Policy & Procedure This policy of XYZ Group of Companies (hereinafter the “Company”) outlines the Company’s provisions for the appropriate use of personal mobile devices in the workplace. This is intended to protect the security and integrity of the Company’s data and technology infrastructure. The Company grants its employees the privilege of bringing and using smartphones and tablets of their choosing at work for their convenience. The Company reserves the right to revoke this privilege if users do not abide by the policies and procedures outlined below. The Company’s employees must agree to the terms and conditions set forth in this policy in order to be able to connect their devices to the company network. The policy applies to any hardware and related software that is not organizationally owned or supplied, but could be used to access organizational resources. That is, devices employees have acquired for personal use but also wish to use in the business environment. OBJECTIVE This policy establishes the Company’s guidelines for employee use of personally owned electronic devices for work-related purposes. Employees of the Company may have the opportunity to use their personal electronic devices for work purposes when authorized in writing, in advance, by the management and the Head of the IT Department. The use of personal devices may be limited based on compatibility of technology. Contact the IT department for more details. SCOPE The purpose of this policy is to define standards, procedures and restrictions for end users who are connecting a personally-owned device to the Company’s organization network for business purposes. This device policy applies, but is not limited to all devices and accompanying media (e.g. USB and external hard drives) that fit the following classifications: ● Smartphones ● Other mobile/cellular phones ● Tablet computers ● Portable media devices ● PDAs ● Ultra-mobile PCs (UMPCs) ● Laptop/notebook computers, including home desktops ● Any personallyowned device capable of storing organizational data and connecting to a network The overriding goal of this policy is to protect the integrity and business data that resides within the Company’s technology infrastructure. This policy intends to prevent this data from being deliberately or inadvertently stored insecurely on a device or carried over an insecure network where it could potentially be accessed by unsanctioned resources. A breach of this type could result in loss of information, damage to critical applications, loss of revenue, and damage to the company’s public image. Therefore, all users employing a personally-owned device connected to [the Company’s organizational network, and/or capable of backing up, storing, or otherwise accessing organizational data of any type, must adhere to company-defined processes for doing so. APPLICABILITY This policy applies to all XYZ Group of Companies employees, including full and part-time staff, contractors, freelancers, and other agents who use a personally-owned device to access, store, back up, or relocate any organization or client-specific data. Such access to this confidential data is a privilege, not a right, and forms the basis of the trust the Company has built with its clients, partners, and other constituents. Consequently, employment at XYZ Group of Companies does not automatically guarantee the initial or on-going ability to use these devices to gain access to organizational networks and information. PROCEDURE Device protocols To ensure the security of the Company, authorized employees are required to have anti-virus and mobile device management (MDM) software installed on their personal mobile devices. This MDM software will store all company-related information, including calendars, e-mails and other applications in one area that is password-protected and secure. The Company’s IT department must install this software prior to using the personal device for work purposes. Employees may store company-related information only in this area. Employees may not use cloud-based apps or backup that allows company-related data to be transferred to unsecure parties. Due to security issues, personal devices may not be synchronized with other devices in employees’ homes. Making any modifications to the device hardware or software beyond authorized and routine installation updates is prohibited unless approved by IT. Employees may not use unsecure Internet sites. All employees must use a pre-set ringtone and alert for company-related messages and calls. Personal calls and messages should be turned off or set to silent or vibrate mode during meetings and conferences and in other locations where incoming calls may disrupt normal workflow. Excessive personal calls, e-mails or text messaging during the workday, regardless of the device used, can interfere with employee productivity and be distracting to others. Employees must handle personal matters out of work time and ensure that friends and family members are aware of the policy. Exceptions may be made for emergency situations and as approved in advance by management. BOYD DEVICES AND SUPPORT The following devices are approved for employee BOYD use and connection to the Company’s network: OnePlus 7T Plus Pro Samsung Galaxy Note 10 Apple iPhone 11 Pro Apple iPhone 11 Apple iPhone XR Apple iPhone XS Max Samsung Galaxy Note 9 Samsung Galaxy S9 Plus Google Pixel 4 XL Google Pixel 3A XL Motorola Moto G7 Power Nokia 7.1 Huawei P30 Pro Huawei P20 Pro Huawei P10 LG G8 ThinQ Xiaomi Mi 9 Oppo Reno 10x Zoom Honor Magic 2 VivoIQOO ZTE Axon 10 Pro 5G Moto G7 Power LG G8X ThinQ Dual Screen Nexus 6P Sony XPERIA XZ3 Devices must be presented to IT for proper job provisioning and configuration of standard apps, such as browsers, office productivity software and security tools, before they can access the network. REIMBURSEMENT The company will reimburse the employee a percentage (5%) of the cost of the device. The company will reimburse the employee for the following charges: roaming, plan overages and monthly service charges. PRIVACY XYZ Group of Companies will respect the privacy of your device and will only request access to the device by IT technicians to implement security controls, as outlined below, or to respond to legitimate requests arising from administrative, civil or criminal proceedings. The Company has the right, at any time, to monitor and preserve any communications that use the Company’s networks in any way, including data, voice mail, telephone logs, Internet use and network traffic, to determine proper use. Management reserves the right to review or retain personal and company-related data on personal devices or to release the data to government agencies or third parties during an investigation or litigation. Management may review the activity and analyse use patterns and may choose to publicise these data to ensure that the Company’s resources in these areas are being used according to this policy. Furthermore, no employee may knowingly disable any network software or system identified as a monitoring tool. RESTRICTIONS ON AUTORIZED USE Employees whose personal devices have camera, video or recording capability are restricted from using those functions anywhere in the building or on company property at any time unless authorized in advance by management. While at work, employees are expected to exercise the same discretion in using their personal devices as is expected for the use of company devices. Company policies pertaining to equality, discrimination, retaliation, Social Media, Intellectual Property, confidential information and ethics apply to employee use of personal devices for work-related activities. Employees may not use their personal devices for work purposes during periods of unpaid leave without authorization from management. XYZ Group of Companies reserves the right to deactivate the company’s application and access on the employee’s personal device during periods of unpaid leave. An employee may not store information from or related to former employment on the company’s application. Family and friends should not use personal devices that are used for company and work-related purposes. Devices may not be used at any time to: Store or transmit illicit materials Store or transmit proprietary information belonging to another company Harass others Engage in outside business activities All employees will be blocked from accessing certain websites or downloading applications during work hours while connected to the corporate network at the discretion of the Company. Such websites include but are not limited to: Facebook Instagram Twitter Snapchat Typito Reddit Tumblr Flickr Pinterest Netflix Google Play ACCEPTABLE USE SAFETY The company defines acceptable business use as activities that directly or indirectly support the business of Company XYZ. The company defines acceptable personal use on company time as reasonable and limited personal communication or recreation, such as reading, checking messages or calling. Devices’ camera and/or video capabilities are disabled while on-site. The following apps are allowed: o The Guardian and any other foreign newspaper app o Weather App o Any local newspaper app o Whatsapp o Waze o BBC News o Any local bank app (HSBC, BOV mobile, etc) o Spotify o Dictionary Apps o Any local taxi apps Employees are expected to follow the National Traffic regulation laws and regulations regarding the use of electronic devices at all times. For further clarification follow the link: https://www.transport.gov.mt/Land-Licence-obtaining-your-driving-licence-Highway-code-eng.pdf-f911 Employees whose job responsibilities include regular or occasional driving are expected to refrain from using their personal devices while driving. Regardless of the circumstances, including slow or stopped traffic, employees are required to pull off to the side of the road and safely stop the vehicle before placing or accepting a call or texting. Special care should be taken in situations involving traffic, inclement weather or unfamiliar areas. Company XYZ has a zero-tolerance policy for texting or emailing while driving and only hands-free talking while driving is permitted. Employees who are charged with traffic violations resulting from the use of their personal devices while driving will be solely responsible for all liabilities that result from such actions. Employees who work in hazardous areas must refrain from using personal devices while at work in those areas, as such use can potentially be a major safety hazard. SECURITY ON USE OF DEVICE IT manages device security policies, network, application and data access centrally using whatever technology solutions it deems suitable. Any attempt to contravene or bypass that security implementation will be deemed an intrusion attempt and will be dealt with in accordance with the Company’s security policy. IT reserves the right, through policy enforcement and any other means it deems necessary, to limit the ability of end users to transfer data to and from specific resources on the Company network. In order to prevent unauthorized access, devices must be password protected using the features of the device and a strong password is required to access the company network. All data stored on the device must be encrypted using strong encryption and complex passwords. Passwords must be at least six characters and a combination of upper- and lower-case letters, numbers and symbols. Passwords will be rotated every 90 days and the new password cannot be one of 15 previous passwords. The device must lock itself with a password or PIN if it’s idle for five minutes. After five failed login attempts, the device will lock. Contact IT to regain access. Rooted (Android) or jailbroken (iOS) devices are strictly forbidden from accessing the network. Employees are automatically prevented from downloading, installing and using any app that does not appear on the company’s list of approved apps. Smartphones and tablets that are not on the company’s list of supported devices are not allowed to connect to the network. Employees’ access to company data is limited based on user profiles defined by IT and automatically enforced. Employees, contractors and temporary staff will follow all Company-sanctioned data removal procedures to permanently erase Company-specific data from such devices once its use is no longer required. LOST, STOLEN, DAMAGED OR HACKED EQUIPMENT Employees are expected to protect personal devices used for work-related purposes from loss, damage or theft. In the event of a lost, stolen, damaged or hacked device, it is incumbent on the user to report the incident to IT immediately. The device will be remotely wiped of all data and locked to prevent access by anyone other than IT. If the device is recovered, it can be submitted to IT for re-provisioning. Appropriate steps will be taken to ensure that company data on or accessible from the device is secured - including remote wiping of the device where appropriate. The remote wipe will destroy all data on the device, whether it is related to company business or personal. RISKS/LIABILITIES/DISCLAIMERS While IT will take every precaution to prevent the employee’s personal data from being lost in the event it must remote wipe a device, it is the employee’s responsibility to take additional precautions, such as backing up email, contacts, etc. The company reserves the right to disconnect devices or disable services without notification. Lost or stolen devices must be reported to the company within 24 hours. Employees are responsible for notifying their mobile service provider immediately upon loss of a device. The employee is expected to use his or her devices in an ethical manner at all times and adhere to the company’s acceptable use policy as outlined above. The employee assumes full liability for risks including, but not limited to, the partial or complete loss of company and personal data due to an operating system crash, errors, bugs, viruses, malware, and/or other software or hardware failures, or programming errors that render the device unusable. Company XYZ reserves the right to take appropriate disciplinary action up to and including termination for noncompliance with this policy. By signing this policy, employees acknowledge that they fully understand the risks and responsibilities of the BYOD policy and procedure. Any questions relating to this policy should be directed to the Head of IT on lawrence.ciantar@xyzcompany.com.mt or the Head of Human Resources on fanina.sciberras@xyzcompany.com.mt A copy of this policy, and related policies and procedures, can be found in the internal drive, Office files, Policies and Procedures. Employee Declaration I,____________________________________, have read and understand the above BYOD Policy, and consent to adhere to the rules outlined therein. ___________________________________ Employee Signature _______________________________ Date ___________________________________ ______________________________ Head of Human Resources Date