BYOD Policy Guide: Securing Personal Devices at Work
Your team brings iPhones, iPads, and personal laptops to the office. They want to check email on personal devices. They want to work from home using their own equipment. This is BYOD—Bring Your Own Device.
It’s convenient for employees and reduces your hardware costs. But it creates security risks. Personal devices aren’t as secured as business devices. Data on personal devices could be at risk. If a personal device is stolen or compromised, company data is vulnerable.
A good BYOD policy balances employee flexibility with data security. It enables modern work practices while protecting your business.
Why BYOD Matters for Security
Data on personal devices. Once your data is on a personal device, you’ve lost some control. You don’t own the device, you don’t manage its security, the employee owns it. If the device is stolen, your data is gone. If the employee’s personal device gets compromised by malware, your company data is at risk.
Mixing personal and business data. An employee checks their personal banking app, then opens your company email. The device context switches. Personal and business data coexist. This increases risk of accidental exposure or theft of business data.
Lost or stolen devices. Unlike company devices you can remotely wipe, a lost personal device containing company data is beyond your control. The employee might never recover it, and it’s unclear what happens to your company data.
Compliance and data protection. If you handle customer data or operate under compliance requirements (Privacy Act, health data regulations, financial data rules), allowing unrestricted access from personal devices might violate those requirements. You need to demonstrate data is protected.
Liability and insurance. If customer data is exposed through a compromised personal device, you’re liable. Your professional indemnity or cyber insurance might not cover it if you didn’t have a BYOD policy.
BYOD isn’t inherently insecure. With proper policies and tools, it’s manageable. Without them, it’s a security disaster waiting to happen.
Building an Effective BYOD Policy
A good BYOD policy addresses:
Approved devices and operating systems. What devices are approved? iOS and Android phones, MacBooks and Windows laptops? What about tablets, smartwatches? Specify which you support. Older devices running outdated operating systems should be restricted—they can’t receive security patches and are vulnerable.
Many organisations approve: iPhones with iOS 16+, Android phones with Android 12+, MacBooks with macOS 13+, Windows laptops with Windows 10+. Your choices depend on your environment.
What data can be accessed. Not all data needs to be on personal devices. Email, yes. Customer lists, maybe. Source code, probably not. Server access, definitely not. Define what data is okay to access from personal devices.
Typically: email and calendar, shared documents, general business information. Not: financial records, customer payment data, highly sensitive client information, administrator-level access, source code.
What applications must be installed. Most organisations require: authenticator app for multi-factor authentication, mobile device management (MDM) agent so you can manage the device, possibly a VPN client for secure remote access.
For iPhones and Android, MDM handles configuration and security enforcement. For laptops, you might use similar tools or require specific antivirus/security software.
Security requirements. Define minimum security standards. Typically:
- Device must have a passcode (6+ digits or equivalent)
- Device must have encryption enabled (standard on modern phones)
- Device must not be jailbroken (iOS) or rooted (Android)
- Device must have anti-malware software
- Device must have a screen lock timeout (15–30 minutes)
- Multi-factor authentication must be enabled for work accounts
Remote wipe capability. If a device is lost, stolen, or leaves the company, you need to remotely wipe company data. MDM solutions enable this. Your policy should state that devices will be remotely wiped if they fail to meet security requirements, are lost, or employment is terminated.
Network access and VPN. Define whether BYOD devices can connect to internal networks directly, or if they must use VPN for remote access. VPN is generally more secure—traffic is encrypted. Direct network access increases risk.
Updates and patching. Devices must keep operating systems and applications updated. Define update timelines. Older devices that can’t receive updates should be removed from BYOD access.
Lost and stolen device procedures. If a device goes missing, what’s the employee’s responsibility? Report it immediately? Accept data wipe? Cooperate with investigations? Define this clearly.
Acceptable use. Define what’s acceptable. Checking work email on your phone: yes. Letting family members use your BYOD device: probably not. Downloading apps that compete with or spy on business systems: definitely not. Be specific.
Privacy balance. State clearly what you will and won’t do. You’ll monitor work-related data and enforcing security policies. You won’t access personal data or monitor personal usage. You won’t use the device for purposes other than BYOD management. This addresses employee concerns about privacy invasion.
Support and troubleshooting. Define what your IT team will support. Will they troubleshoot personal email accounts, personal WiFi issues, or other personal problems? Usually: no. They’ll only troubleshoot work-related applications and data. Be clear on boundaries.
Mobile Device Management (MDM) Solutions
To enforce BYOD policy, you need MDM tools. These are applications that enrol and manage mobile devices.
What MDM does:
- Enforces device passcode requirements
- Requires device encryption
- Detects jailbroken/rooted devices and blocks access
- Manages app distribution and updates
- Enforces security policies (screen timeout, inactivity lock)
- Remotely wipes company data if device is lost or employee leaves
- Provides compliance reporting (which devices are enrolled, which are compliant)
- Blocks access from non-compliant devices
Common MDM solutions:
Microsoft Intune (for Microsoft 365 organisations). Intune manages iPhones, Android devices, Macs, and Windows computers. It’s integrated with Microsoft 365 and works well if you’re already in Microsoft’s ecosystem.
Google Workspace MDM (for organisations using Google Workspace). Simpler than Intune but handles Android and iPhones.
Apple Business Manager (for iOS/macOS only). If your organisation is primarily Apple devices, this is effective.
Third-party solutions (MobileIron, Kandji, Jamf). These offer broader platform support and advanced features. They cost more but provide comprehensive management across multiple platforms.
For most Australian SMEs using Microsoft 365, Intune is built-in and sufficient. If you need to manage Android and iOS devices in a non-Microsoft environment, Google Workspace MDM or third-party solutions work well.
Implementation Steps
Step 1: Draft policy. Define what devices you support, what data is accessible, what security is required, what happens if policies are violated. Get feedback from your team and legal counsel (if you have it).
Step 2: Choose MDM solution. Select tools that fit your environment. For Microsoft 365 organisations, Intune is the obvious choice. For others, evaluate Google Workspace MDM or third-party solutions.
Step 3: Pilot with early adopters. Roll out BYOD management to a small group first. Work through issues. Refine procedures. Ensure it works before organisation-wide rollout.
Step 4: Communicate policy to team. Before mandatory rollout, explain the policy and why it exists. Address concerns. Make clear this is about protecting the business and customer data, not spying on employees. Provide training on how to enrol and manage their devices.
Step 5: Enrol devices. Have employees enrol their devices. Provide IT support for any issues. Verify all devices meet security requirements.
Step 6: Enforce and monitor. Once rolled out, monitor compliance. Block non-compliant devices from accessing company data. Investigate why devices are non-compliant and help employees remediate issues.
Step 7: Maintain and review. As threats evolve, review and update your BYOD policy. Periodically retrain employees. Monitor for new security threats and adjust policies if needed.
Common BYOD Challenges
Employee resistance. Employees see BYOD security as intrusive. They’re annoyed at being required to enrol devices or having screen timeouts enforced. Address this by: clearly explaining the security needs, transparently stating what data will and won’t be monitored, involving employees in policy development, and being responsive to reasonable concerns.
Technical issues. Enrolment fails. Device management breaks. Apps don’t work on personal devices. Have IT support ready to troubleshoot. For widespread issues, be prepared to adjust policy—maybe a specific app doesn’t work on Android, so Android users don’t need it.
Legacy devices. Employees with very old phones or laptops can’t meet security requirements. Decide whether to: require device upgrades (they buy new hardware), provide company devices for those who can’t meet requirements, or restrict their BYOD access. Document your approach.
Contractors and temporary workers. Do contractors need BYOD access? If so, do they enrol in MDM and follow the same policy as employees? Be clear on this.
Personal data concerns. Employees worry you’ll access personal data or monitor personal activity. Use privacy-respecting MDM configurations that only manage work-related accounts and data. Communicate clearly what you can and cannot see.
Compliance and BYOD
If you handle regulated data (health information, financial data, customer payment data), BYOD complicates compliance. You need to ensure that even on personal devices, data is protected according to regulations.
This typically means:
BYOD devices must meet minimum security standards (encryption, passcode, updates).
You must have the ability to remotely wipe work data if the device is lost or compromised.
You must maintain audit logs showing who accessed what data, when, and from which device.
You must be able to demonstrate compliance if audited.
A good MDM solution with audit logging helps meet these requirements. Document your BYOD security measures for compliance audits.
The Employee Privacy Balance
The biggest concern with BYOD policies is employee privacy. Employees are right to worry—if you manage their personal devices, you could theoretically monitor everything.
A good BYOD policy addresses this explicitly: you will only manage work-related accounts and data. You won’t monitor personal email, personal browsing, personal app usage, personal photos, personal contacts. Personal data remains the employee’s private domain.
Modern MDM solutions can be configured this way. You manage a work profile separate from the personal profile. Work data is isolated and managed. Personal data is untouched.
Being transparent about this—clearly stating what you will and won’t do—builds trust and makes employee adoption easier.
Getting Help
Implementing BYOD policies can be complex. Many organisations work with IT support providers to design, implement, and maintain BYOD programs. They can help:
Draft a BYOD policy tailored to your business.
Select and implement MDM tools.
Pilot and refine the program.
Provide employee training and support.
Monitor compliance and respond to issues.
If you need help implementing or improving BYOD security, we work with Australian businesses to design effective BYOD programs. Call 1300 028 324 or get in touch online.




