Bring Your Own Device (BYOD) Onboarding Procedure (AC-PROC-002)

1. Purpose

To establish the process for registering and securing a personally-owned device (BYOD) for access to company resources.

2. Scope

This procedure applies to all workforce members who wish to use a personal device to access company information or systems.

3. Overview

This procedure details the steps for a workforce member to register a personal device for company use, including obtaining consent, installing required security software, and ensuring the device meets security standards before access is granted.

4. Procedure

Step Who What
1 Workforce Member Requests to use a personal device for work purposes.
2 Workforce Member Provides formal consent to the installation of security software and acknowledges the company’s right to remotely wipe corporate data.
3 Workforce Member The device is formally registered with the IT Department.
4 IT Department Installs and verifies required security software (MDM/EDR) and confirms the device meets minimum security standards (encryption, access control, malware protection).
5 IT Department Access is granted to company resources.

5. Standards Compliance

Procedure Step(s) Standard/Framework Control Reference
1-5 SOC 2 CC6.1, CC6.6
1-5 HIPAA 45 CFR § 164.310(d)(1)

6. Artifact(s)

A completed and signed BYOD Registration and Consent form.

7. Definitions

  • BYOD (Bring Your Own Device): A policy that allows employees to use their personal devices for work-related purposes.
  • MDM (Mobile Device Management): Software that allows an organization to manage and secure employees’ mobile devices.
  • EDR (Endpoint Detection and Response): A solution that monitors endpoint and network events and records the information in a central database for analysis, detection, investigation, reporting, and alerting.

8. Responsibilities

Role Responsibility
Workforce Member Requests to use a personal device, provides consent, and ensures their device is available for security setup.
IT Department Manages the device registration process, installs and verifies security software, and grants access.
Managers Ensure their team members follow this procedure when using personal devices for work.