Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 123

Bring Your Own Device (BYOD)

What is Bring Your Own Device (BYOD)?

Bring Your Own Device (BYOD)A workplace model in which employees use their personally owned smartphones, tablets, or laptops to access corporate applications and data.


BYOD lowers hardware spend and improves user satisfaction but raises the security challenge of protecting corporate data on devices the company does not own. Typical safeguards combine Mobile Application Management or Android Work Profile to isolate work data, conditional access that checks OS version, jailbreak/root status, and EDR signals before letting a device reach corporate resources, and acceptable-use policies that define what the employer may do to a personal device, including selective wipe at offboarding. Regulators in healthcare and financial services often require explicit BYOD policies. Failure modes include personal apps with broad permissions exfiltrating data and lost devices without screen lock exposing email.

Examples

  1. 01

    An employee uses their personal iPhone with an Intune work profile to access Microsoft 365 email.

  2. 02

    Conditional access blocks access to Salesforce from a rooted Android phone enrolled in BYOD.

Frequently asked questions

What is Bring Your Own Device (BYOD)?

A workplace model in which employees use their personally owned smartphones, tablets, or laptops to access corporate applications and data. It belongs to the Mobile Security category of cybersecurity.

What does Bring Your Own Device (BYOD) mean?

A workplace model in which employees use their personally owned smartphones, tablets, or laptops to access corporate applications and data.

How does Bring Your Own Device (BYOD) work?

BYOD lowers hardware spend and improves user satisfaction but raises the security challenge of protecting corporate data on devices the company does not own. Typical safeguards combine Mobile Application Management or Android Work Profile to isolate work data, conditional access that checks OS version, jailbreak/root status, and EDR signals before letting a device reach corporate resources, and acceptable-use policies that define what the employer may do to a personal device, including selective wipe at offboarding. Regulators in healthcare and financial services often require explicit BYOD policies. Failure modes include personal apps with broad permissions exfiltrating data and lost devices without screen lock exposing email.

How do you defend against Bring Your Own Device (BYOD)?

Defences for Bring Your Own Device (BYOD) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Bring Your Own Device (BYOD)?

Common alternative names include: BYOD, Bring your own device.

Related terms