Richtlinien

Mobile Device Usage Policy (BYOD/MDM)

TL;DR
  • BYOD, COPE, and COBO are three fundamentally different models with different security requirements. Your policy must clearly define which model applies.
  • Mobile Device Management (MDM) is the technical foundation for enforcement. Without MDM, any mobile device policy remains toothless.
  • Data separation between private and business data is mandatory for BYOD — both technically (containers) and legally (data protection).
  • A documented process for loss and theft is mandatory. Every hour counts when a device with corporate data goes missing.

Why Mobile Devices Need Their Own Policy

Smartphones, tablets, and laptops are standard tools in nearly every organization. Employees read emails on their smartphones, access cloud services on the go, photograph whiteboards with tablets, and work from home on laptops. This flexibility is productive but creates an attack surface that fundamentally differs from stationary workstations.

Mobile devices leave the protected corporate network. They connect to public Wi-Fi networks, can be stolen, are shared with family members, or simply get lost. These risks must be anchored in the overarching information security policy and specified in a dedicated mobile device policy. At the same time, these devices store emails, contacts, credentials, and sometimes entire project documentation. A single compromised smartphone can give an attacker a path into the corporate network.

ISO 27001 addresses mobile devices through several controls, particularly A.8.1 (User endpoint devices), A.6.7 (Remote working), A.7.9 (Security of assets off-premises), and A.8.20 (Network security). A standalone mobile device policy bundles these requirements into a practically implementable document.

BYOD vs. COPE vs. COBO: The Three Basic Models

Before you write a policy, you must make a fundamental decision: who owns the devices, and who manages them? There are three established models that differ significantly in cost, security, and user-friendliness.

BYOD (Bring Your Own Device)

In the BYOD model, employees use their personal devices for business purposes. The company does not provide hardware but enables access to corporate systems via private smartphones and laptops.

Pros:

  • Lower hardware costs for the company
  • Employees use familiar devices
  • No dual equipment (one device instead of two)

Cons:

  • Limited control over the device (operating system, updates, installed apps)
  • Data protection challenges (private data on the same device)
  • Complex data separation required
  • Legal gray area for remote wipe
  • Heterogeneous device landscape complicates support and security management

BYOD is the most cost-effective model but also carries the greatest security and data protection risks. It is best suited for organizations with low protection requirements or as a supplementary model for specific scenarios (e.g., MFA token on a personal smartphone).

COPE (Corporate Owned, Personally Enabled)

In the COPE model, the company provides the devices but allows limited personal use. The device belongs to the company; the employee may, however, also use it privately (e.g., install personal apps, browse privately).

Pros:

  • Full control over hardware and operating system
  • Updates and security patches centrally manageable
  • Uniform device landscape simplifies support
  • Employees appreciate the option of personal use

Cons:

  • Higher hardware costs
  • Personal use requires data separation (container solution)
  • Data protection law must clearly regulate what the company may view and what it may not

COPE is the best compromise between security, cost, and employee satisfaction for most mid-market companies.

COBO (Corporate Owned, Business Only)

The most restrictive model: the company provides the devices and prohibits any personal use. IT has full control, can dictate all apps, fully manage the device, and wipe it without data protection concerns if needed.

Pros:

  • Maximum control and security
  • No data separation required
  • Remote wipe without legal complications
  • Clear conditions: the device is a work tool, nothing more

Cons:

  • Employees carry two devices (personal + business)
  • Higher costs
  • Lower acceptance among employees

COBO is suited for environments with high protection requirements: government agencies, the financial sector, healthcare, or organizations with particularly sensitive data.

Mixed Models

In practice, many companies combine models. The most common combination: COPE for smartphones and tablets, company-owned laptops with limited personal use, and BYOD exclusively for the second MFA factor on the personal smartphone. Your policy should clearly define which model applies to which device category.

Mobile Device Management (MDM): The Technical Foundation

Regardless of the chosen model, you need a technical solution to centrally manage mobile devices and enforce the policy. Mobile Device Management (MDM) is that solution. Modern MDM platforms offer far more than just device management and are therefore also referred to as UEM (Unified Endpoint Management).

Core Functions Your MDM Must Cover

Device Enrollment and Inventory:

  • Automated registration of new devices
  • Overview of all managed devices with OS version, model, and status
  • Assignment of devices to users and departments

Policy Enforcement:

  • Enforcement of passcode/biometrics on the device (per password policy)
  • Minimum operating system version
  • Device storage encryption
  • Automatic screen lock after inactivity
  • Blacklisting certain apps or whitelisting only approved apps
  • VPN requirement for accessing corporate data

Data Separation (Containerization):

  • Separate container for corporate data and apps
  • No data exchange between personal and business areas (no copy-paste, no file sharing)
  • Corporate emails and contacts visible only within the container

Remote Actions:

  • Remote wipe: complete device erasure upon loss/theft
  • Selective wipe: erasing only corporate data and container (particularly relevant for BYOD)
  • Remote lock: immediately lock the device
  • Passcode reset: reset access code

Compliance Monitoring:

  • Detection of jailbreak/root (compromised operating system)
  • Monitoring of OS version and patch level
  • Automatic response upon non-compliance (e.g., revoking access to corporate data)

MDM and Data Protection

Especially with BYOD and COPE, data protection is a sensitive topic. Employees have legitimate concerns that the company could view private data or control the private device through the MDM. Your policy must transparently establish:

  • What the MDM can see (device model, OS version, compliance status) and what it cannot (private photos, messages, browsing history)
  • That a selective wipe erases only corporate data, not personal content
  • That no location tracking of private devices occurs (unless the employee voluntarily activates this in case of loss)
  • That the MDM introduction has been coordinated with the works council

This transparency is critical for acceptance. If employees do not trust the MDM, they will find ways to circumvent it, and then you have shadow IT on mobile devices.

Mobile Device Policy Content: Example Outline

Here is a complete outline you can use as a starting point for your own policy:

1. Introduction and Purpose

  • Policy objective: protection of corporate data on mobile devices
  • Reference to the information security policy and the ISMS
  • Definition of "mobile devices" (smartphones, tablets, laptops, wearables)

2. Scope

  • Covered device types and operating systems
  • Covered user groups (employees, external service providers, interns)
  • Designation of the provisioning model (BYOD/COPE/COBO per device category)

3. Responsibilities

  • IT department: provisioning, configuration, MDM operations, support
  • ISM: policy maintenance, risk assessment, incident coordination
  • Managers: approval of device assignments, enforcement within the team
  • Employees: duty of care, reporting obligations, policy compliance

4. Approved Devices and Operating Systems

  • Minimum hardware requirements
  • Supported operating systems and minimum versions (e.g., iOS 17+, Android 14+)
  • Devices that are not permitted (e.g., rooted/jailbroken devices, outdated models without security updates)

5. Device Configuration and Security Requirements

  • Device encryption must be enabled
  • Screen lock with passcode (at least 6 digits) or biometrics
  • Automatic lock after a maximum of 5 minutes of inactivity
  • Automatic installation of security updates
  • VPN requirement for accessing internal resources
  • Prohibition of installing apps from unauthorized sources (sideloading)
  • Disabling Bluetooth and Wi-Fi auto-connect in public places

6. Data Separation and Containers

  • Use of a container solution for BYOD and COPE
  • Business emails, contacts, and documents exclusively within the container
  • No transfer of corporate data to the personal area
  • No backup of corporate data to personal cloud services (iCloud, personal Google Drive)
  • Screenshots disabled within the corporate container

7. App and Cloud Service Usage

  • Only approved apps for business purposes
  • Prohibition of personal messengers for business communication
  • Use of the enterprise app store (if available)
  • Approval process for additional apps

8. Network and Connections

  • Prohibition of using open/unencrypted Wi-Fi for business data
  • VPN requirement when using public networks
  • Tethering/hotspot rules
  • Bluetooth usage: only for verified devices (headsets etc.), no file transfer

9. Loss, Theft, and Compromise

  • Immediate reporting obligation (within 2 hours) to IT and ISM
  • Emergency process flow:
    1. Report to IT helpdesk
    2. Remote lock by IT
    3. Risk assessment (which data was on the device?)
    4. Remote wipe or selective wipe
    5. Check for data protection breach (GDPR reporting obligation within 72 hours?)
    6. Documentation and lessons learned
  • Police report in case of theft
  • Provision of a replacement device

10. Decommissioning and Return

  • Deletion of all corporate data upon return or departure
  • Verification of complete data deletion by IT
  • Documentation of the return
  • For BYOD: selective wipe of the corporate container

11. Personal Use (COPE/BYOD only)

  • Scope of permitted personal use
  • Clear delineation: what may be used privately, what may not
  • Cost allocation (data volume, repairs)
  • Liability for device damage

12. Data Protection and Employee Rights

  • Transparency about MDM functions (what is captured, what is not)
  • No access to private data by the company
  • No location monitoring without consent
  • Compatibility with works agreement

13. Violations and Consequences

  • Revocation of access authorization upon non-compliance
  • Escalation process
  • Employment law consequences for repeated or serious violations

14. Training and Awareness

  • Mandatory training before device issuance/registration
  • Annual refresher
  • Content: secure usage, phishing on mobile devices, behavior upon loss

15. Review and Update

  • Annual review cycle
  • Event-driven updates (new threats, OS changes, vendor changes)
  • Versioning and approval process

Data Separation: The Heart of BYOD and COPE

Separating private and business data is the central challenge with BYOD and COPE. Without clean data separation, multiple problems arise: the DSGVO (GDPR) prohibits processing of private data by the employer without a legal basis, and conversely, corporate data must not flow into personal backups and cloud services.

Technical Data Separation (Containers)

The most proven solution is containerization. A container app or work profile (Android Work Profile, Apple Managed Apps) creates a walled-off area on the device:

  • Corporate data resides encrypted in the container
  • Apps in the container cannot communicate with apps outside
  • Copy-paste between the container and the personal area is blocked
  • The IT administrator can only manage and wipe the container, not the entire device

Modern MDM solutions provide this containerization out of the box. On Android, the technology is called "Work Profile"; on iOS, Apple relies on "Managed Apps" and "User Enrollment." The policy should specify which container solution is used and which apps run in the container. In ISMS Lite, such requirements can be documented in a structured way and versioned via approval workflow.

Organizational Data Separation

Technology alone is not enough. Your policy must also define organizational rules:

  • Business emails are read and sent exclusively via the corporate mail app
  • Business documents are not stored in personal cloud storage
  • Business photos (e.g., whiteboard photos) are taken only with the camera within the container
  • Business communication does not take place via personal messengers (no WhatsApp for customer contact)

The last point is frequently ignored in practice. Many employees use WhatsApp for quick coordination with colleagues or even customers. From a GDPR perspective, this is highly problematic because WhatsApp accesses the entire address book and transfers metadata to the US. Your policy must draw a clear line here and at the same time offer a usable alternative (e.g., Microsoft Teams, Signal in the container, or a dedicated business messenger).

Loss and Theft: The Emergency

The loss of a mobile device is not an exception but a statistical certainty. Sooner or later, a smartphone gets lost or is stolen. Your policy must define a clear, immediately executable process because every hour counts.

The Emergency Process in Detail

Phase 1: Immediate Report (0-2 hours after discovery)

  • Employees report the loss by phone to the IT helpdesk (not by email, as this is time-critical)
  • Information: when and where lost/stolen, which data was on the device, was the device locked, was VPN active
  • IT performs an immediate remote lock

Phase 2: Risk Assessment (2-4 hours)

  • IT and ISM jointly assess the risk:
    • Was the device encrypted?
    • Was the screen lock active?
    • Was particularly sensitive data on the device (personal data, trade secrets)?
    • Was the container active and functional?
  • Decision on remote wipe (full or selective)
  • Check whether a reportable data protection incident exists (GDPR Art. 33: 72-hour deadline)

Phase 3: Containment (4-24 hours)

  • Passwords for all services used on the device are reset
  • VPN certificates and tokens are revoked
  • Active sessions are terminated
  • For BYOD: selective wipe of the corporate container
  • For COPE/COBO: full remote wipe
  • Police report in case of theft

Phase 4: Recovery and Post-Incident Review (1-5 days)

  • Provision of a replacement device
  • New setup and MDM enrollment
  • Documentation of the incident in the incident register
  • Assessment of whether processes or technical measures need improvement

Practice Makes the Difference

This process only works when it is known and rehearsed. Employees must know whom to call and what to say. IT must be able to execute a remote lock within minutes. You should test this at least once annually, ideally as part of the general incident response exercise.

Mobile Threat Landscape

To justify the requirements of your policy, it helps to understand the specific threats to mobile devices:

Phishing on Smartphones

Mobile phishing (also "smishing" for SMS or "vishing" for calls) is particularly effective because smartphones display less context than desktop browsers. URLs are truncated, email headers are harder to inspect, and input on small screens tempts users to follow links rather than manually typing URLs.

Insecure Networks

Public Wi-Fi in hotels, cafes, and airports is a classic attack vector that even a VPN solution cannot fully neutralize. Man-in-the-middle attacks can intercept data traffic when no VPN is active. Even with encrypted connections (HTTPS), metadata and DNS requests can be intercepted.

Malware and Malicious Apps

Although Apple's and Google's app stores provide basic curation, malicious apps regularly pass through screening. Particularly dangerous are apps installed via sideloading (sources outside the official store). Your policy should fundamentally prohibit sideloading.

Physical Access

A stolen or found device without a screen lock provides direct access to emails, cloud services, and possibly stored passwords. Even with a screen lock, forensic tools can bypass protection on older devices or outdated operating systems. This is why device encryption combined with a strong passcode is so important.

Outdated Operating Systems

Devices that no longer receive security updates are known vulnerabilities. Your policy should define minimum OS versions and automatically exclude devices that do not meet them from accessing corporate data. This can be technically enforced as a compliance rule via MDM.

Mobile Device Policy and ISO 27001

The mobile device policy touches on a whole range of controls from ISO 27001 Annex A:

  • A.8.1 (User endpoint devices): Core requirement for the security of devices used by users.
  • A.6.7 (Remote working): Governs security requirements for working outside company premises.
  • A.7.9 (Security of assets off-premises): Protection of devices and data outside company grounds.
  • A.5.10 (Acceptable use of information): The policy defines the acceptable handling of corporate data on mobile devices.
  • A.8.20 (Network security): VPN requirements and secure network connections.
  • A.8.12 (Data leakage prevention): Containers and DLP measures prevent uncontrolled data outflow.

An auditor will check whether the policy exists and is current, whether MDM is actually in use and technically enforces the policy, whether there is evidence of training and acknowledgment, and whether the loss process has been documented and tested.

Typical Implementation Pitfalls

Personal Messengers for Business Communication

In almost every company, WhatsApp groups exist for team communication. This is not only problematic from a data protection perspective but also undermines data separation. Your policy must clearly prohibit this and offer an alternative. If the alternative is more cumbersome than WhatsApp, it will not be adopted. Invest in a user-friendly solution.

No Emergency Process for Device Loss

Many policies define that a loss must be reported but not how. Is there a 24/7 hotline? What happens at night or on weekends? Who has authorization for a remote wipe? These details determine whether the response is fast enough in an actual emergency.

MDM Resistance Among Employees

Especially with BYOD, employees may perceive the MDM as a surveillance tool and refuse to install it. Transparent communication about what the MDM can and cannot see is critical. A data protection impact assessment and a works agreement create additional trust.

Outdated Devices Without Update Support

When employees use personal devices that no longer receive security updates, you have a problem. Your policy must define and enforce minimum versions. This also means that you either equip employees with devices that are too old or exclude them from accessing corporate data.

Missing Provisions for Employee Departure

What happens to the corporate container on the BYOD device when someone leaves the company? The offboarding process must include the selective wipe of the container, and this must be documented. If you forget this, corporate data lingers on former employees' devices for months.

Pragmatic Implementation in Five Steps

  1. Choose your model: Decide whether BYOD, COPE, COBO, or a mixed model fits your company. Consider protection requirements, budget, and corporate culture.

  2. Evaluate and introduce MDM: Select an MDM solution that fits your device landscape. Test it with a pilot group before rolling it out. Clarify data protection matters with the works council.

  3. Draft the policy: Use the outline from this article as a starting point. Adapt it to your chosen model and MDM solution. Align it with IT, the data protection officer, and the works council.

  4. Training and rollout: Training before device issuance, not after. Employees must understand why the rules apply and how to use the MDM. Offer an FAQ section and a contact person for questions.

  5. Monitoring and review: Monitor MDM compliance, respond to non-compliance, and review the policy annually. Adapt it to new operating systems, new threats, and lessons learned from security incidents.

Conclusion

Mobile devices are a permanent fixture of modern workplaces and will remain so. A well-thought-out mobile device policy protects your organization against the specific risks that come with smartphones, tablets, and laptops. It gives employees clear rules, creates the foundation for technical enforcement via MDM, and provides auditors with evidence that you take mobile security seriously.

Further Reading

What matters is that the policy does not just exist on paper. MDM must be running, the container solution must be configured, the loss process must be rehearsed, and employees must be trained. Then a potential security risk becomes a manageable part of your IT landscape.

Implement your mobile device policy in a structured way?

ISMS Lite gives you the relevant controls for mobile device management — from BYOD requirements and containerization to loss procedures — each with practical implementation guidance. The built-in AI generates a tailored policy from your selected controls, which you version through an approval workflow and have employees digitally acknowledge.

Install now