BYOD Policy

This document is intended to communicate corporate policies established for Bring Your Own Device(BYOD) practices. Devices such as smart devices (i.e. Smart Phones and Tablets PCs) and laptops are concerned by this document. Usage and access to corporate network and corporate resources are provided under the condition that users have carefully read and understood the contents of this document and sign that they agree to adhere to this corporate BYOD policy.

Expectation of Privacy

SLIIT will requests access to the device by technicians to respect their privacy with your personal device and to respond only to security checks or to legitimate requests for discovery resulting from administrative criminal proceedings or civil.

Acceptable Use

·         Devices should not be used by the users in a way that it will not hares others.
·         Devices should not be used by the users to navigate pornography websites, sexist, racist or other offensive material.
·         Users should not be allowed to download third-party applications and pirate versions of applications by using their devices.
·         It is illegal for the users to use hacking tools and unethical tools to perform any kind of attacks or interruptions.
·         There should not be any disturbance for others when you use your devices.
·         All mobile devices should have strong authentication mechanisms.
·         The organizational bandwidth should not be used by the users to engage in outside business activities.
Users may use their devices to access the following resources.
·         Users may use their devices for educational purposes such as refer course materials, download course contents.
·         Devices can be used to upload course materials, upload assignments and upload notices.
·         To access mails.

Device and Support

The following devices are supported:
·         Mobile phones (Samsung s4 s5 s6, iPhone 4s 5s 6, Sony mobiles, HTC mobiles)
·         Tab Devices (Google pixel, iPad, Asus Zen Pad)
·         Laptop (Asus, HP, DELL, LENOVO, MAC book)
·         Storage devices (USB Pen Drive, Portable Hard drive)


The following devices are prohibited:
·         Wireless Signal Transmitters (Ubertooth one, WIFI Pineapple)
·         Hacking Devices (Raspberry Pi 3, Alfa Network board, Rubber Ducky, LAN Turtle, Hack RF One, Proxmark3 Kit, Lockpicks)


·         In SLIIT, Windows and MAC OS are only supported for the Laptop and Tab.       
·         In SLIIT, Windows and MAC OS, Android operating system are only supported for the Mobile  Devices.
·         Connectivity issues are controlling by the IT department of SLIIT. If there are any issues in login to  Wi-Fi network or login issues on accounts in SLIIT need to contact the administrator, in IT  department.
·         Devices should be presented to the IT   Department for Proper job provisioning for configure  devices.
·         IT Department will respond to support request by phone, email or person.
·         All Remote support will be provided in line with the SLIIT policy for remote support.

Security

·         So as to connect a device to the corporate network, a device's password must comply with the password policy of the company.

·         Password policy of the company is as follows: Minimum password length is 8 characters, password must include alpha numeric characters (Both letters and numbers are essential.), password must contain at least 1 special character. Passwords cannot be common dictionary words. Passwords must be changed once in 3 months.

·         Device Software must be updated with latest updates and security patches provided by the respective software vendors.

·         It is mandatory for users to have Antivirus/ Antimalware services installed and ensure that automatic download of malware definitions is enabled.

·         Users must use VeraCrypt software to encrypt corporate data saved in to the hard disks of laptops.

·         Users must ensure that email clients are up to date and ensure that spam filters are in order.

·         Users must remove all corporate data from the devices before transferring the ownership of a device used to connect to the corporate network.

·         In the event, where a user's device used to connect to corporate networks, were lost/ stolen etc. users must be capable of remotely destroying corporate information contained in the device. Software’s that enable remote wiping should be installed, configured and tested on the devices used to connect to the corporate networks.

·         Smart devices which have been rooted or jailbroken cannot access the corporate network.
·         Devices must have automatic screen locking when the device connected to the corporate network is in idle.

·         Users must scan removable media inserted to devices for malware before usage.

Risks / Liabilities / Disclaimers

·         IT Department of SLIIT will take every safeguard precaution to prevent the company data as well as employee’s personal data from being hijack by intruders.

·         And it is a responsibility of each and every employee and student to protect inside information from the outsiders.

·         When you are dealing with wiping out the data from a device it’s a must you have to back up all the contacts, emails and all the necessary data in case if you need later on.

·         When bringing your own device to the premises you are only allowed to connect your device only with our network.

·         We will be noticed if you have connected to other networks rather than our company network and we have all authority to takedown measures even if to suspend if any circumstances occurred.  

·         Students and staff should report a case to the IT Department if any of the device has been lost.
·         Department of IT Team will have all the authority to wipeout data or to disable services without a notification in any circumstances.

·         The consumer of the device is expected to use the device in an ethical manner.
SLIIT authority will not be liable for all costs associated with device or to an operating system errors, crash, viruses, bugs, malware, and other software or hardware failures, or the device unusableness. 

Comments

Popular posts from this blog

Phishing

CySCA 2014 Web Penetration Testing Write-up

Double Submit Cookies Patterns