- Users must use personal assets such as Desktops, Laptops, MacBook’s, Tablets for Tech Mahindra, or Customer work only if approved by ISG.
- BYOD assets cannot be brought to Tech Mahindra offices and connected to Tech Mahindra office networks.
- BYOD assets cannot be utilized such as configuring & accessing Emails, Chat & Collaboration Tools, Corporate Storage Drives, Corporate Document Management Systems, Corporate VPN, Corporate Code Repository systems.
- BYOD assets cannot be utilized to access Tech Mahindra or Customer Applications & VPN Systems with Tech Mahindra or Customer - Confidential/ PII / SPI / Proprietary / IPR information etc.
- BYOD assets cannot be taken to Customer offices and connected to Customer office networks unless explicitly authorized by Customer Information security team.
- Users must use licensed software and adhere to security requirements for personal assets, including encryption, password protection, and security software.
- Users must not attempt to bypass access control measures or allow unauthorized individuals to use personal assets for work related tasks.
- Users must only use applications and software authorized by TIM or Customer on personal assets when performing work duties.
- Users must use secure network connections, such as VPNs, when accessing company assets.
- Users must not upload, download, store or transfer any Tech Mahindra or Customer data to personal assets.
- Users must report any security incidents related to suspicious action on the BYOD assets immediately to ISG incident management team.
Important Note: Tech Mahindra has approved limited usage of Handheld Smart Phones for configuring Corporate Emails, Teams based on certain roles, bands, and approved exceptions.