Purpose
The World Scout Bureau (WSB) recognises the benefits that can be achieved by allowing staff to use their own electronic devices when working, whether that is at home, in a WSB facility or while travelling.
Such devices include laptops, smart phones and tablets, and the practice is commonly known as ‘bring your own device’ or BYOD. The WSB is committed to supporting staff in this practice and ensuring that reasonable and/or less technical restrictions are imposed on the user in accessing the IT Resources set up by the WSB.
The WSB must ensure that the information security risks arising from the use of personal computing devices is controlled. The control does not apply to the use of personal devices to access the WSB information and data that are intended for public access.
Scope
This policy is for all WSB staff, contractors, consultants, interns and volunteers who are authorised to use their personally owned computing devices to store, access, carry, transmit, receive or use WSB information or data, whether on an occasional or regular basis. The term for personal computing devices used for work is called BYOD (“bring your own device”).
Personal Computing Devices
A Personal Computing Device is any device that was purchased by an individual and was not issued by WSB. A personal device includes any portable technology features as listed in Appendix B. Threats to mobile handheld devices stem mainly from their size, potability, and available wireless interfaces and associated services.
The WSB will maintain management control and authorise the use of personally owned devices. The WSB shall develop guidelines to define which employees can use their own devices, the types of devices they can use, and which information and data that they can access, process, or store on their devices.
Personal computing devices must:
- Be authorised by WSB to access, process, transmit and/or store information and data of WSB.
- Be inspected by WSB IT staff to ensure appropriate security on the device are up to date and meet the requirements of WSB Information Security Policy prior to use.
Definitions
A list of terms used throughout this policy are defined in Appendix A.
Guiding Principles
The following are accompanying policies to this policy:
Policy
Acceptable Use
- The WSB defines acceptable personal use of any device on company time as a reasonable amount of time for leisure activities. Please refer to the WSB Acceptable Technology Use Policy for more details.
- Employees are prohibited from inappropriate web-content using their personal computing devices connected to a WSB Information Technology Resources (e.g. LAN or Internet).
- During working hours, the personal computing device may not be used to store any:
- Illicit or illegal material
- Store or transmit propriety information belonging to other organisation
- Harass others
- Engage in other external ventures or activities.
Security & Safety
- To prevent unauthorised access, personal computing devices must be protected with passwords
- The WSB Password Standards Policy provides a guideline on how to set strong password for all devices.
- Employees may use their personal computing devices to access the following company services:
- Emails
- Calendars
- Contacts
- Documents
- Other Information Systems or Cloud based computing systems/software packages.
- All personal computing devices running Windows OS MUST be protected with an Anti-Virus application and is updated to the latest operating system patches and updates.
- Rooted Android and Jailbroken iOS device are strictly not permitted to access any WSB Information Technology (IT) resources.
- WSB Staff, contractors, consultants, and volunteers using their personally owned devices connected to the WSB Information Technology (IT) resources are expected to follow applicable local, state and federal laws and regulations regarding the use of electronic devices at all times.
- Employees are expected to protect personal devices used for work purposes from potential unauthorised access, hacking, loss, damage or theft.
- If members of the user’s household regularly use the personal device, then it is strongly recommended that encryption is implemented to protect the WSB’s data stored on the user’s personally owned devices.
Monitoring & Access
- The WSB retains the right in determining what is, and is not, appropriate content and has overall responsibility for the appropriate access to and use of the WSB’s Information Technology (IT) resources.
- Since the WSB will not routinely monitor personal computing devices, the WSB also reserves the following right:
- To monitor, access and review all use of WSB resources and infrastructure. This includes all personal information exchange carried out on the user’s personally owned devices connected to the WSB’s Information Technology (IT) resources.
- To regularly review user’s access to WSB Information Technology (IT) resources and revoke any access if needed.
- To take all necessary and appropriate steps to retrieve information owned by the WSB.
- The WSB will not be responsible for loss or damage of personal applications or data resulting from the use of the WSB’s applications.
Roles & Responsibilities
Stakeholders |
Responsibilities |
Senior Management Team |
Review, Approve and formally support this policy |
Users |
|
IT Department (Senior Manager, Digital & IT Services, IT Coordinators) |
|
Line Managers, Supervisors, Department Heads |
|
Policy Distribution & Awareness
This policy and it's supporting policies, standards and guidelines will be published on the WSB Dropbox.
Soft copies of the policy and its supporting policies, standards and guidelines will be available on WSB Staff Support Center.
The IT Personnel and/or the Senior Manager, Digital & IT Services may make periodic policy announcements by email.
WSB line managers will ensure that all existing and new staff, contractors, consultants, interns, volunteers and third-party commercial service providers who report to them are made aware of and have access to the policy and its supporting policies, standards and guidelines.
Individuals requiring clarification on any aspect of the policy and its supporting policies, standards and guidelines and/or advice on general I.T. security matters may email their queries to the Senior Manager, Digital & IT Services or the local IT Personnel.
Exceptions to this Policy
Exceptions to the guiding principles in this policy must be documented and formally approved by the Global Director, Communications , with evidence of support from the appropriate Senior Management Team.
Policy exceptions must describe:
- The nature of the exception.
- A reasonable explanation for why the policy exception is required
- Any risks created by the policy exception.
- Evidence of approval.
Policy Enforcement
The WSB reserves the right to take such action as it deems appropriate against individuals who breach the conditions of this policy. WSB staff, contractors, consultants, interns and volunteers who breach this policy maybe subject to disciplinary action, including suspension and dismissal as provided for in the WSB disciplinary procedure.
Breaches of this policy by a third-party commercial service provider, may lead to the withdrawal of WSB information technology resources to that third party commercial service provider and/or the cancellation of any contract(s) between the WSB and the third-party commercial service provider.
The WSB reserves the right to refer any use of its IT resources for illegal activities to the relevant Authorities.
Review & Update
This policy will be reviewed and updated annually or more frequently if necessary, to ensure any changes to the WSB’s organisation structure and business practices are properly reflected in the policy.
Appendix A: Definitions
Devices: Any technology and electronic features used to store, access, carry, transmit, that require the use of WSB information and/or data on occasional and/or regular basis.
Device includes any portable technology such as camera, USB flash drives, USB thumb drives, DVDs, CDs, air cards and mobile wireless devices such as Androids, Apple iOS, Windows Mobile, tablets, laptops, or any personal desktop computer
Information: Any data in an electronic format that is capable of being processed or has already been processed.
Information Technology (I.T.) resources: Includes all computer facilities and devices, networks and data communications infrastructure, telecommunications systems and equipment, internet/intranet and email facilities, software, information systems and applications, account usernames and passwords, and information and data that are owned or leased by the WSB.
IT Personnel: These are the individuals responsible for the day to day management of a WSB network domain. Also includes WSB personnel who have been authorised to create and manage user accounts and passwords on a WSB network domain
Line manager: The individual a user report directly to.
Password: A string of characters that a user must supply in order to gain access to an IT resource.
Process / Processed / Processing: Performing any manual or automated operation or set of operations on information including:
- Obtaining, recording or keeping the information.
- Collecting, organising, storing, altering or adapting the information.
- Retrieving, consulting or using the information.
- Disclosing the information or data by transmitting, disseminating or otherwise making it available.
- Aligning, combining, blocking, erasing or destroying the information.
Users: Any authorised individual who uses the WSB’s IT resources.
Appendix B: Types of Portal Devices
Personal computing devices such as notebooks and laptops.
Personal Mobile phones
Personal handheld tablets