Definition

BYOD policy

Contributor(s): Colin Steele
This definition is part of our Essential Guide: A CIO's guide to SMAC strategy and governance

A BYOD policy, or bring-your-own-device policy, is a set of rules governing a corporate IT department’s level of support for employee-owned PCs, smartphones and tablets.

A BYOD policy can take many different forms. Some organizations cut back on corporate-issued PCs and laptops, instead giving employees a stipend to purchase and maintain technology equipment of their choosing. More commonly, however, organizations will agree to support personal mobile devices -- at least to some degree -- in addition to corporate-issued equipment. The rules in a BYOD policy often vary depending on a user’s role in the organization, his or her specific device, application requirements and other factors.

The consumerization of IT has highlighted the need for bring-your-own-device policy development. Employees use their own PCs and mobile devices for business tasks whether their IT departments support them or not, and a BYOD policy can help control this usage and mitigate its security risks.

This was last updated in December 2011

Continue Reading About BYOD policy

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

There are also distinct risks of use that must be accounted for when making a BYOD policy. This includes, but is not limited to the blend of personal and business data, shared use, disposal and even injury.
Cancel
Thanks for the article Margaret. This is mostly common sense, but you put it in terms and a perspective that's more valuable than just saying "Create an IT and BYOD policy to make sure everyone knows what is expected." While that is ultimately the case, a policy also allows IT and users to communicate and understand each other and the goals on each side. Smart piece.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close