Professional Documents
Culture Documents
BYOD Policy
BYOD Policy
This policy provides guidelines for the use of personally owned notebooks, smart phones, tablets
and {insert other types of mobile devices} for institution purposes. All staff who use or access
{Municipality Name}'s technology equipment and/or services are bound by the conditions of this
Policy.
Procedures
The following personally owned mobile devices are approved to be used for institution purposes:
{insert type of approved mobile devices such as notebooks, smart phones, tablets, iPhone,
removable media etc.}
{insert type of approved mobile devices such as notebooks, smart phones, tablets, iPhone,
removable media etc.}
{insert type of approved mobile devices such as smart phones, tablets, iPhone etc.}
{insert type of approved mobile devices such as notebooks, smart phones, tablets, iPhone,
removable media etc.}.
Page 14 of 30
IT Policy and Procedure Manual
Guidance: You will need to consider if the institution is to have any control over the applications
that are used for institution purposes and/or used on the personal devices.
Employees when using personal devices for institution use will register the device with {insert
relevant job title or department here}.
{insert relevant job title or department here} will record the device and all applications used by
the device.
Personal mobile devices can only be used for the following institution purposes:
{insert each type of approved use such as email access, institution internet access,
institution telephone calls etc.}
{insert each type of approved use such as email access, institution internet access,
institution telephone calls etc.}
{insert each type of approved use such as email access, institution internet access,
institution telephone calls etc.}.
Not to use the registered mobile device as the sole repository for {Municipality Name}'s
information. All institution information stored on mobile devices should be backed up
To make every reasonable effort to ensure that {Municipality Name}'s information is not
compromised through the use of mobile equipment in a public place. Screens displaying
sensitive or critical information should not be seen by unauthorised persons and all
registered devices should be password protected
To maintain the device with {insert maintenance requirements of mobile devices such as
current operating software, current security software etc.}
Page 15 of 30
IT Policy and Procedure Manual
Not to share the device with other individuals to protect the institution data
access through the device
To abide by {Municipality Name}'s internet policy for appropriate use and access of
internet sites etc.
To notify {Municipality Name} immediately in the event of loss or theft of the registered
device
All employees who have a registered personal mobile device for institution use acknowledge that
the institution:
Can access all data held on the device, including personal data
Will delete all data held on the device in the event of loss or theft of the device
Has first right to buy the device where the employee wants to sell the device
Will delete all data held on the device upon termination of the employee. The terminated
employee can request personal data be reinstated from back up data
Has the right to deregister the device for institution use at any time.
The following must be observed when handling mobile computing devices (such as
notebooks and iPads):
Mobile computer devices must never be left unattended in a public place, or in an
unlocked house, or in a motor vehicle, even if it is locked. Wherever possible they
should be kept on the person or securely locked away
Cable locking devices should also be considered for use with laptop computers in
public places, e.g. in a seminar or conference, even when the laptop is attended
Page 16 of 30
IT Policy and Procedure Manual
Exemptions
This policy is mandatory unless {insert relevant job title or department here} grants an
exemption. Any requests for exemptions from any of these directives, should be referred to the
{insert relevant job title or department here}.
Any breach of this policy will be referred to {insert relevant job title} who will review the
breach and determine adequate consequences, which can include { insert consequences here
such as confiscation of the device and or termination of employment.}
Indemnity
{Municipality Name} bears no responsibility whatsoever for any legal action threatened or
started due to conduct and activities of staff in accessing or using these resources or facilities. All
staff indemnify {Municipality Name} against any and all damages, costs and expenses suffered
by {Municipality Name} arising out of any unlawful or improper conduct and activity, and in
respect of any action, settlement or compromise, or any statutory infringement. Legal
prosecution following a breach of these conditions may result independently from any action by
{Municipality Name}.
Purchasing Policy