Creating an acceptable use policy that’ll be followed and enforceable

You can’t police everything users do on company machines, nor should you try to.

Sample data transfer and storage policy template

Storing and transferring data has never been easier for workers – or more dangerous. Here is a sample policy you can build off of in order to set rules and best practices for how users can transfer sensitive information without letting it fall into the wrong hands. 

While IT sweats BYOD policies, users reject them

Two recent reports show that neither users nor IT are particularly comfortable with BYOD as it stands today. And while IT is working to refine these policies, users are likely to ignore them. 

Sample BYOD policy template

Bring your own device (BYOD) programs call for three critical components: a software application for managing the devices connecting to the network, a written policy outlining the responsibilities of both the employer and the users, and an agreement users must sign, acknowledging that they have read and understand the policy.

BYOD policy keys to avoid legal trouble

As more employees use their personal computing devices at work, companies have to ask some questions about their rights to manage a gadget that someone else owns. 

3 hidden costs of BYOD – and what to do about them

When deciding on a mobile strategy, here are three hidden costs of BYOD companies need to consider. 

Study: 91% of all accounts use one of the 1,000 least secure passwords

Password security requires a delicate balance. Many policies require complex codes, but if IT goes too far, users will end up breaking the rules when they can or keep their passwords written on paper. 

5 policy mistakes that sink BYOD programs

A BYOD policy is becoming a requirement for most companies – unfortunately, for many organizations, creating an effective policy involves a lot of trial and error. 

5 ways to make users care more about security

No surprise here, but a recent survey shows just how little many employees care about IT security while they’re at work. How can IT managers get them to change their attitudes? 

Could boss read employee’s personal email?

IT must often walk a fine line between protecting employees’ privacy and enforcing IT policies and procedures. Being on the wrong side of the line can get organizations into legal trouble.