Bring Your Own Device Policy

Introduction

Redgate recognise there needs to be a balance between convenience and the need to protect Redgate’s information and business interests, with respect to the use of personal devices.

The purpose of this Policy is to explain Redgate’s requirements when connecting personal devices to Redgate’s systems. It also explains how to behave with respect to personal devices in the workplace.

Scope

The scope of this Policy includes all Redgate staff who use, or intend to use, personally owned device/s to access/process any Redgate information, including (but not limited to):

  • Email
  • Files
  • Contacts
  • Source code
  • Slack and/or other collaboration tools

…or any other non-Public information relating to or processed by Redgate (please refer to the Information Classification Policy).

Policy

Business use

Redgate encourages its Redgate staff to use a personally owned device to enable Multi-factor Authentication (MFA) capabilities, office visit and desk management and keyless door entry. Your device will need to meet the following requirements, if your device cannot meet these requirements, please contact IT Operations.

  • A screen lock (PIN (min 6 characters), pattern, fingerprint or face recognition) must be enabled
  • Screen lock should activate if the device is idle for >2mins
  • Remote locate and wipe is enabled
  • All security updates are applied, and the operating system is under active support by the manufacturer
  • The device is encrypted
  • Jailbroken devices may not be used to connect to Redgate’s network or be used to access any Redgate data
  • Suitable care is given to what applications are installed

If a device that has been used for business purposes is lost or stolen, the individual must report this loss to the IT Operations team immediately.

Other considerations

Redgate staff should understand that when connected to Redgate’s network, use of personal devices falls within Redgate’s Acceptable Use Policy.

Please refer to Redgate’s Acceptable Use Policy for more details.

  • Personal devices are the responsibility of the owner, and not Redgate.

When changing a device that has been used to connect to Redgate services, ensure the device is completely wiped and returned to factory settings before disposing or recycling the device.

Policy compliance

Use of Redgate owned technology and systems must be in keeping with our Information Security-related Policies. Failure to do so may result in disciplinary action.