- Key MDM allowances (such as administrator permissions).
- User obligations if a device is lost or stolen.
Devices (platforms, operating systems, versions) granted access to corporate resources.
Corporate resources (email and calendars, for example) that users can access through their personal devices.
- Security policies about sensitive information. Acknowledge that the device is enabled with proprietary corporate data and is subject to enterprise security policies. For example, include details about a passcode profile that sets a maximum number of failed passcode attempts before a device is wiped.
Inappropriate behaviors that are not tolerated according to your normal business standards, such as using the device to harass others.
Reimbursement policies for telecom and other costs. For example, whether you have a stipend plan for telecom charges, the cost of apps (personal vs. work-related), and roaming charges.
One option is to modify an existing document that employees sign for computer use and access. Customize this document to BYOD by including the information that is collected from employee-owned devices.