Redgate recognise there needs to be a balance between convenience and the need to protect Redgate’s information and business interests, with respect to the use of personal devices.
The purpose of this Policy is to explain Redgate’s requirements when connecting personal devices to Redgate’s systems. It also explains how to behave with respect to personal devices in the workplace.
The scope of this Policy includes all Redgate staff who use, or intend to use, personally owned devices to access/process any Redgate information, including (but not limited to):
…or any other non-Public information relating to or processed by Redgate (please refer to the Information Classification Policy (internal document - link removed)).
Redgate encourages its Redgate staff to use a personally owned device to enable Multi-factor Authentication (MFA) capabilities, office visit and desk management and keyless door entry. Your device will need to meet the following requirements, if your device cannot meet these requirements, please contact IT Operations.
If a device that has been used for business purposes is lost or stolen, the individual must report this loss to the IT Operations team immediately.
Redgate staff should understand that when connected to Redgate’s network, use of personal devices falls within Redgate’s Acceptable Use Policy.
Please refer to Redgate’s Acceptable Use Policy (internal document - link removed) for more details.
When changing a device that has been used to connect to Redgate services, ensure the device is completely wiped and returned to factory settings before disposing or recycling the device.
Use of Redgate owned technology and systems must be in keeping with our Information Security-related Policies. Failure to do so may result in disciplinary action.