The policy can address issues such as the impact of the Stored Communications Act and Record Retention and Destruction; approaching lost or stolen devices; configuring a device to receive and transmit corporate data; acceptable passwords to use; acceptable encryption standards; allowable (and unallowable) devices; jail-broken, rooted or compromised devices; and what happens to data and audit trails when an employee leaves the company.
The company adds that, if your company doesn’t have a Bring Your Own Device policy, then personal devices are either being blocked or are likely already accessing your corporate network, with or without your knowledge.
The BYOD policy applies to, but is not limited to, all devices and media that fit the following classifications: smartphones; PDAs; USB applications and data; laptop/notebook/tablet computers; mobile/cellular phones; home/personal computers used to access enterprise resources; and any mobile device capable of storing corporate data and connecting to an unmanaged network, says Janco.