Page 125 - Gulf Coast Division - Training Manual 5 -18
P. 125

Ben E. Keith Company: BYOD (Bring Your Device) Policy
        Effective Date:  August 1, 2014


        Ben E. Keith Company allows its employees to use mobile computing devices at work for their convenience. These
        devices may also be configured to remotely connect to the Ben E. Keith Company network, applications, and services to
        conduct official business.

        This policy is intended to protect the security and integrity of Ben E. Keith Company’s data and technology
        infrastructure.  Mobile devices must be appropriately secured to prevent sensitive or confidential company data from
        being lost or compromised, and to mitigate other forms of abuse of the Ben E. Keith computing infrastructure.  Every
        employee who utilizes a mobile electronic device (e.g. iPhone, iPad, Android phone or tablet, Windows phone or tablet,
        etc.) is responsible for the Ben E. Keith Company data stored, processed and/or transmitted via that device, and for
        following the security requirements set forth in this policy.

        Ben E. Keith employees must agree to the terms and conditions set forth in this policy in order to be able to connect
        their devices to the company network.  You must read and sign this document before access will be granted.  Ben E.
        Keith Company reserves the right to revoke this privilege if you do not abide by the policies and procedures outlined
        below.

        Acceptable Use

            •  The company defines acceptable business use as activities that directly or indirectly support the business of Ben
               E. Keith Company.
            •  You may use your authorized personal devices to access the following company-owned resources: email,
               calendars, contacts, documents, business applications.
            •  You may be blocked from accessing certain websites while connected to the corporate network at the discretion
               of the company.
            •  You may not use your devices at any time to:
                   o  Access, store, or transmit illicit materials
                   o  Harass or intimidate others
                   o  Participate in illegal activities

        Devices and Support
            •  Smartphones including iPhone, Android, Blackberry, and Windows phones are allowed.
            •  Tablets including iPad, Android, Blackberry, and Windows are allowed.
            •  I.T. will assist with connectivity issues such as configuring your device for access to our email system or VPN.
               You should contact the device manufacturer or your carrier for all other issues regarding you personally owned
               devices.  BEK-owned devices will be supported by I.T.
            •  Your mobile device may not be fully compatible with some of our business applications.


        Security
            •  In order to prevent unauthorized access, devices must be password protected.  At a minimum, a simple (4 digit)
               PIN/Passcode must be used.
            •  The device must lock itself with a password or PIN if it’s idle for five minutes.




                                                                                                             1
   120   121   122   123   124   125   126   127   128