BYOD Policy: What to Include When Employees Use Personal Devices
A BYOD (Bring Your Own Device) policy governs the circumstances under which employees may access company data and systems from devices they personally own, setting out the security controls the device must meet and the boundary between the organisation's legitimate interest in its data and the worker's right to privacy on their own property.
What this policy is
A BYOD policy sits at a difficult intersection. On one side are information security obligations: ISO/IEC 27001:2022 Annex A.8.1 requires user endpoint devices to be subject to defined security measures; UK GDPR Article 32 requires technical and organisational measures commensurate with the risk; SOC 2 CC6.7 requires transmission and handling controls to extend to endpoints. On the other side are worker-privacy constraints: Article 88 of the UK GDPR preserves national employment-privacy rules; the UK Employment Rights Act 1996 protects against unreasonable detriment; Article 8 of the European Convention on Human Rights (incorporated into UK law via the Human Rights Act 1998) protects private life, including on devices the worker owns.
The policy mediates between those two. It establishes that participation in BYOD is voluntary; that access is conditional on defined controls being in place; that the company can and will manage its own data, within its work container, using mobile device management (MDM) or mobile application management (MAM); and that the personal data and personal use of the device are outside the company's scope. Where these boundaries are clear, BYOD is compatible with ISO 27001, SOC 2, UK GDPR and the ECHR. Where they are blurred, the organisation creates legal exposure and employee distrust in equal measure.
The policy also matters operationally because BYOD has grown from a fringe practice to the default for a significant portion of the workforce: remote workers using home laptops for Slack and email, contractors using their own phones for mobile two-factor authentication, executives syncing calendars on personal tablets. Without a written policy every one of these points is an uncontrolled risk.
Who needs one
A BYOD policy is required by any organisation whose employees or contractors access company systems or data from devices the company does not own. In practice this is almost every organisation above 10 employees, including:
- Organisations where mobile email and messaging are accessed on personal phones — the most common BYOD scenario, often invisible until a device is lost.
- Hybrid and remote-first organisations where the employer does not issue a company laptop and the home device handles everything.
- Organisations engaging contractors or consultants who will almost certainly use their own devices.
- Regulated sectors with explicit endpoint expectations — FCA SYSC for financial services, NHS DSP Toolkit for health, PCI DSS for card data, HMG Security Policy Framework for classified public-sector contracts.
- Organisations pursuing ISO/IEC 27001, where Annex A.8.1 scrutiny of endpoint management will include BYOD if it is in scope.
Note that a “no BYOD” stance is itself a policy position and should be stated and enforced. Without a written prohibition and technical controls to back it up, shadow BYOD proliferates.
What must be in it
A defensible BYOD policy covers the following clauses. Each should be operationalised with appropriate technical configuration; the policy text alone is insufficient without MDM/MAM to enforce it.
- Eligibility — which roles are permitted to use BYOD. Roles with access to special category personal data, payment card data, or classified information are commonly excluded.
- Supported device types and OS — minimum iOS and Android versions, macOS and Windows versions where applicable, minimum hardware capabilities (encryption support, biometric authentication). Devices that cannot meet the baseline are not supported.
- Enrolment and registration — the process by which a device becomes an approved BYOD device, including the MDM or MAM enrolment step. Enrolment must be voluntary, with the employee informed of what is and is not installed.
- Mandatory security controls — full-disk encryption, screen lock with passcode or biometric (minimum 6 digits or equivalent), auto-lock within a defined idle period, keeping the OS within a supported version window, installation of the organisation's endpoint security agent where applicable, and disabling of untrusted sideload sources on Android.
- MDM/MAM expectations — what the management platform does and does not see. Typical MAM posture: the organisation can see device OS version and model, work app version, whether the device is jailbroken/rooted; it cannot see personal apps, personal contacts, personal photos, personal messages, or location when the work profile is not active.
- Data separation — work-only containers or profiles (Android Enterprise Work Profile, iOS Managed Apps, macOS managed configurations) keep company data logically separate from personal data. Copy-paste restrictions between work and personal containers are commonly enforced.
- Acceptable apps and unacceptable apps — allow-list or block-list for work-profile apps, with specific mentions of file-sharing, messaging and AI applications that must not process company data on the personal profile.
- Company data handling rules — prohibition on storing company documents in personal cloud storage (personal iCloud, personal Dropbox, personal Google Drive), prohibition on using personal email for company business, restrictions on printing company data from a personal printer.
- Monitoring and privacy boundaries — the single most important and most commonly mishandled clause. It must state precisely what the employer can see (work container telemetry only), what it cannot see (the personal side of the device), and the lawful basis for the monitoring that does occur. Any monitoring beyond the work container requires a separate UK GDPR assessment and almost always fails proportionality. The ICO's 2023 employment practices guidance and the Article 29 Working Party's Opinion 2/2017 on data processing at work are the relevant references.
- Loss/theft reporting — the employee's duty to report a lost or stolen device within a defined window (commonly 4 hours), the escalation route, and the immediate remote-wipe trigger for the work container.
- Departure/leaving procedure — on termination or role change, the work container is selectively wiped and the device is unenrolled. The policy must make clear, up front, that this is a partial wipe affecting company data only and must not destroy personal data. A full-device wipe of a personal device is disproportionate and legally risky.
- Employee declarations — informed consent to the MDM/MAM profile, acknowledgement of the policy, declaration that the device is owned or otherwise lawfully available, and confirmation that the employee accepts financial responsibility for device damage or loss where not caused by employer action. Some organisations require a signed BYOD agreement separate from the acknowledgement of the AUP.
Common pitfalls
1. Full-device wipe instead of selective wipe
Policies that reserve the right to wipe the entire device on termination or suspected loss almost always fail proportionality under UK GDPR Article 5(1)(c) and risk civil action for destruction of personal property. Use containerisation and selective wipe; make the selective nature explicit in the policy.
2. Overbroad monitoring
Treating the BYOD device as equivalent to a company-owned device for monitoring purposes is unlawful in the UK and EU. The personal side of the device is out of scope. State this clearly; the alternative is tribunal exposure.
3. No OS version floor
Without a minimum OS version the organisation ends up with devices running unpatched systems accessing company data. Specify the supported window (typically the current major version and the previous one) and enforce it through MDM compliance policies.
4. Missing the leaver scenario
The leaver is the moment at which BYOD risk concentrates: access revocation, data return, selective wipe, shared-drive disconnection, MFA device re-issue. If the BYOD policy does not describe the leaver workflow step by step, it will not happen consistently.
5. Silent about jailbroken/rooted devices
A jailbroken iOS device or rooted Android device defeats the OS security model. The policy must prohibit enrolment of such devices, and MDM compliance policies should detect and block them.
6. Ignoring the expense question
Failing to address device allowances creates tax ambiguity (HMRC treatment) and employment-law exposure in jurisdictions like California (Labor Code s 2802). Either state that no reimbursement is offered (and accept the BYOD uptake will be lower) or offer a stipend and document how it is calculated.
7. Treating BYOD contractors the same as employees
Contractors frequently have data-return obligations under the contract that go beyond the employer/employee relationship. The BYOD policy should either exclude contractors and handle their devices through the contracting process, or include them with explicit clauses on contract termination data handling.
Framework mapping
| Framework | Reference | What it requires |
|---|---|---|
| ISO/IEC 27001:2022 | Annex A.8.1 | User endpoint devices: configuration, protection, and management of devices handling organisation information. |
| NIST CSF 2.0 | PR.AC-6 (now PR.AA-05) | Access permissions and authorisations managed with least privilege, including device-identity based access. |
| UK GDPR | Article 32 | Appropriate technical and organisational measures, risk-assessed for BYOD specifically. |
| Employment Rights Act 1996 | S 43A onwards; implied trust & confidence | Monitoring and data handling on personal devices must respect the employee's reasonable expectation of privacy. |
| Human Rights Act 1998 / ECHR Art 8 | Right to respect for private life | Privacy on personal property extends into BYOD scope; proportionality test applies to any intrusion. |
| SOC 2 (AICPA TSC) | CC6.7, CC6.8 | Transmission, movement and removal of information protected across authorised endpoints. |
| PCI DSS v4.0 | Req 9.9 & 12.3.10 | Where cardholder data environment (CDE) is accessed from personal devices, specific controls and prohibition scenarios apply. |
How it fits with other policies
- Acceptable Use Policy — the AUP sets the baseline rules of use; the BYOD policy extends them to personal devices and adds device-specific requirements.
- Information Security Policy — the high-level ISP under which BYOD sits; the BYOD policy is the implementation detail for one class of endpoint.
- Remote Work Policy — covers physical workspace and home-network aspects of working outside the office; BYOD is the device-layer complement.
- Incident Response Plan — describes the overall IR workflow that a BYOD loss/theft feeds into; BYOD policy states the report-within-4-hours obligation.
- Mobile Device Management Configuration Baseline — a technical document companion to the policy, specifying the MDM/MAM profile, app allow-list, compliance rules.
- Data Classification Policy — governs which data classes may be handled on BYOD endpoints; typically public and internal are permitted, restricted and confidential are not.
Frequently asked questions
Can an employer lawfully wipe a personal device remotely?
Only with informed, prior consent documented in the BYOD policy and acknowledged by the employee. Even then, a full-device wipe that destroys personal data (photos, contacts, personal app data) is disproportionate under UK GDPR Article 5(1)(c) in almost all circumstances. The defensible posture is containerisation: a work profile or managed app that the organisation can selectively wipe without touching personal data. Android Enterprise Work Profile and iOS Managed Apps both support this cleanly.
Do we have to pay employees for use of their own device?
Not as a matter of UK employment law, but several jurisdictions require it. California Labor Code Section 2802 requires reimbursement for necessary expenditure including work use of personal mobile devices (Cochran v Schwan's 2014). Similar rules exist in Illinois and Massachusetts. For UK employers, the question is whether a device stipend is offered; most BYOD programmes provide a monthly allowance both to encourage enrolment and to resolve tax ambiguity. HMRC's Employment Income Manual treats a reasonable business-use proportion as allowable expenditure.
Is BYOD compatible with ISO 27001 certification?
Yes, provided the controls in Annex A.8.1 (User endpoint devices) are documented and operated. The auditor will want to see the BYOD policy, the MDM or MAM configuration baseline, evidence of device enrolment records, the acceptable-apps and blocked-apps list, the lost-device procedure, and the leaver wipe workflow. Many organisations also document a specific BYOD risk assessment under A.5.7 (Threat intelligence) and A.8.2 (Privileged access rights) because BYOD typically introduces additional threats that a pure company-issued-device estate does not.
What happens if an employee refuses to enrol their device in MDM?
The employer can lawfully refuse access to company systems from unenrolled devices — that is not a disciplinary matter, it is simply withholding a privilege. Where access to email or systems is a reasonable job requirement, the alternative is to issue a company device. What the employer cannot do is enrol the device covertly or apply policies the employee has not agreed to. The BYOD policy should make the voluntary nature of participation explicit and set out the company-device alternative.
How do we handle a subject access request involving a BYOD device?
If the request concerns personal data processed in the course of the employee's work, the search must extend to work containers on BYOD devices just as it would to company-issued devices. The BYOD policy should state that work-profile data is subject to discovery, preservation for legal hold, and subject rights requests. The personal side of the device is outside the organisation's processing scope and outside the search. This distinction is why containerisation matters legally as well as operationally.
Ready to implement this policy?
PolicySuite's InfoSec 38 Enterprise Policy Pack includes a BYOD policy pre-drafted for your jurisdiction and device estate, together with 37 related security and workforce policies covering AUP, remote work, incident response, and information classification.
£950 one-off · 38 policies