Bayarcash

Remote Work & IT Asset Usage Policy

Version 1.0
Effective Date [Insert Date]
Approved By Compliance & Risk Committee
Next Review Date [Insert Date]

1. Purpose

The purpose of this policy is to define the standards and responsibilities for employees working remotely and using Bayarcash IT assets. This ensures secure, productive, and compliant operations while safeguarding company data and resources.

2. Scope

This policy applies to:

  • All Bayarcash employees, contractors, and third-party personnel working remotely or using Bayarcash IT assets.
  • All IT assets, including laptops, mobile devices, software, applications, and cloud services provided by Bayarcash.

3. Remote Work Guidelines

3.1 Eligibility

  • Employees must have prior approval from their manager and HR to work remotely.
  • Roles requiring on-site presence for operational reasons may not be eligible for full remote work.

3.2 Work Hours & Availability

  • Employees must maintain regular work hours as agreed with their manager.
  • Employees should remain accessible via phone, email, or collaboration tools during work hours.

3.3 Work Environment

  • Employees must maintain a safe, secure, and distraction-free workspace.
  • Confidential information should not be exposed to unauthorized persons in the remote location.

3.4 Data Security & Compliance

  • Employees must follow Bayarcash IT security policies, including password management, VPN usage, and encryption standards.
  • No company data may be stored on personal devices unless approved and secured by IT.
  • Sensitive data must not be shared via unsecured channels.

4. IT Asset Usage

4.1 Provision of IT Assets

  • Bayarcash provides laptops, mobile devices, and necessary software to employees for business use.

4.2 Responsibilities

Employees must:

  • Use IT assets solely for legitimate business purposes.
  • Protect devices from theft, loss, or unauthorized access.
  • Keep software and systems up to date and report any technical issues to IT immediately.
  • Return IT assets promptly upon termination or role change.

4.3 Prohibited Activities

  • Installing unauthorized software or connecting unapproved devices.
  • Accessing or sharing malicious or illegal content.
  • Using company assets for personal commercial purposes or excessive personal use.

4.4 Monitoring & Audit

  • Bayarcash reserves the right to monitor usage of IT assets and remote access for security and compliance purposes.

5. Security Measures for Remote Work

  • Remote connections must use Bayarcash-approved VPN or secure network.
  • Multi-factor authentication (MFA) is required for access to sensitive systems.
  • Devices must have updated antivirus, firewall, and endpoint protection.
  • Lost or stolen devices must be reported immediately to IT and management.

6. Roles & Responsibilities

Employees

  • Comply with this policy and all Bayarcash IT security policies.
  • Ensure confidentiality and integrity of company data.

Managers

  • Approve remote work arrangements and monitor employee productivity.
  • Ensure team members adhere to IT asset and data security requirements.

IT Team

  • Provision, maintain, and secure IT assets.
  • Provide technical support and enforce security standards.
  • Conduct audits to ensure compliance with policies.

7. Breaches & Disciplinary Action

  • Violations of this policy may result in disciplinary action, up to and including termination.
  • Employees must report any security incidents, data breaches, or misuse of IT assets immediately.

8. Policy Review

  • This policy is reviewed at least annually or when organizational, technological, or regulatory changes occur.