Page 125 - Gulf Coast Division - Training Manual 5 -18
P. 125
Ben E. Keith Company: BYOD (Bring Your Device) Policy
Effective Date: August 1, 2014
Ben E. Keith Company allows its employees to use mobile computing devices at work for their convenience. These
devices may also be configured to remotely connect to the Ben E. Keith Company network, applications, and services to
conduct official business.
This policy is intended to protect the security and integrity of Ben E. Keith Company’s data and technology
infrastructure. Mobile devices must be appropriately secured to prevent sensitive or confidential company data from
being lost or compromised, and to mitigate other forms of abuse of the Ben E. Keith computing infrastructure. Every
employee who utilizes a mobile electronic device (e.g. iPhone, iPad, Android phone or tablet, Windows phone or tablet,
etc.) is responsible for the Ben E. Keith Company data stored, processed and/or transmitted via that device, and for
following the security requirements set forth in this policy.
Ben E. Keith employees must agree to the terms and conditions set forth in this policy in order to be able to connect
their devices to the company network. You must read and sign this document before access will be granted. Ben E.
Keith Company reserves the right to revoke this privilege if you do not abide by the policies and procedures outlined
below.
Acceptable Use
• The company defines acceptable business use as activities that directly or indirectly support the business of Ben
E. Keith Company.
• You may use your authorized personal devices to access the following company-owned resources: email,
calendars, contacts, documents, business applications.
• You may be blocked from accessing certain websites while connected to the corporate network at the discretion
of the company.
• You may not use your devices at any time to:
o Access, store, or transmit illicit materials
o Harass or intimidate others
o Participate in illegal activities
Devices and Support
• Smartphones including iPhone, Android, Blackberry, and Windows phones are allowed.
• Tablets including iPad, Android, Blackberry, and Windows are allowed.
• I.T. will assist with connectivity issues such as configuring your device for access to our email system or VPN.
You should contact the device manufacturer or your carrier for all other issues regarding you personally owned
devices. BEK-owned devices will be supported by I.T.
• Your mobile device may not be fully compatible with some of our business applications.
Security
• In order to prevent unauthorized access, devices must be password protected. At a minimum, a simple (4 digit)
PIN/Passcode must be used.
• The device must lock itself with a password or PIN if it’s idle for five minutes.
1