By: Internal Communications Team
Published: Jan 8, 2026
AI Summary: The 2026 Device Policy mandates a strict Zero-Trust Security model requiring continuous device health checks. It strictly prohibits entering Sensitive Data into unapproved, public Generative AI tools (like public LLMs) to prevent IP leakage. The policy also shifts to a Corporate-Owned, Personally-Enabled (COPE) strategy for high-risk roles and requires the installation of AI-powered endpoint detection (EDR) software on all devices to combat advanced, AI-driven cyber threats.
The single most critical change is the strict implementation of a Zero-Trust security model. This means no user or device is trusted by default, regardless of location (on-site or remote).
Continuous Device Attestation: All devices—company-issued and approved personal devices—must now pass a real-time device health check upon every connection attempt. This check verifies the operating system is up-to-date, endpoint security software is active, and no unauthorized software is running.
Mandatory Strong Isolation: Access to Sensitive Data (e.g., customer financial data, proprietary source code) will be segmented using application-specific security containers. Data downloaded to the device must reside within an encrypted, isolated corporate workspace that IT can remotely wipe without affecting personal files.
End-of-Life (EOL) Policy: Devices running an operating system past its manufacturer-supported end-of-life date will be automatically blocked from accessing all corporate resources, a non-negotiable step to combat sophisticated AI-assisted attacks.
The proliferation of Generative AI tools and AI-powered cyberattacks requires explicit rules on how company data is handled by both employees and AI models.
Prohibited Use with Public LLMs: Employees are strictly prohibited from inputting any Sensitive Data (including internal meeting notes, client names, or proprietary product concepts) into any unapproved, public Large Language Models (LLMs) like ChatGPT, Claude, or Gemini. This prevents data leakage and preserves our intellectual property.
Mandatory AI-Enabled Security Tools: All company devices will have next-generation AI-powered endpoint detection and response (EDR) software installed. This software uses behavioral analytics to detect and contain threats that traditional anti-virus tools might miss.
Internal AI Sandboxes: For approved AI workflows, employees must use our Internal AI Development Environment which runs proprietary or vetted-vendor models, ensuring all data remains within our secure, governed network.
The security complexity and compliance risks posed by blending personal and corporate data on one device have led to a revised BYOD strategy.
Policy Shift to Corporate-Owned, Personally-Enabled (COPE): For roles with regular access to Sensitive Data, the company will be shifting from a BYOD stipend to providing a Corporate-Owned, Personally-Enabled (COPE) device. This provides the company with greater security control while still allowing employees personal use under defined guidelines.
Limited BYOD Scope: BYOD will be restricted primarily to mobile phones for basic email, calendar, and low-risk applications. Laptops used for work must be company-issued unless an explicit, high-level exception is approved and secured with our mandated endpoint management software.
Privacy Statement Update: The revised policy clarifies that for any device accessing corporate resources, the company reserves the right to monitor network traffic and remotely wipe corporate applications and data in case of theft or separation. Personal data will not be accessed or monitored.
Action Required: All employees must review the full, detailed 2026 Device Policy on the HR portal by January 31, 2026.
Would you like me to generate a checklist of the top five security actions an employee needs to take to be compliant by the deadline?