How and whether private cell phones can be used differs among our customers and depends significantly on their standards and culture. From our viewpoint, there are the following options:
1. It’s possible to provide "unrestricted" access.
With this version, every employee is free to download and log into COYO Classic or the COYO app from the respective store.
All internal COYO apps and documents are available in a mobile form.
Option available for: Cloud, On-Premises, Private Cloud
All internal COYO apps and documents are available in a mobile form.
Option available for: Cloud, On-Premises, Private Cloud
2. Company agreements on use with private cell phones
As legal protection for the first option, many companies make use of terms of use, in which agreements are developed within the company with a data protection officer.
The employee can continue to install the app independently.
Option available for: Cloud, On-Premises and Private Cloud
The employee can continue to install the app independently.
Option available for: Cloud, On-Premises and Private Cloud
3. Restricted access due to IT infrastructure settings
It’s possible to restrict access via VPN tunnels.
However, configuring this tunnel is not a standard service from COYO as the IT infrastructure needs to be configured via the server.
However, configuring this tunnel is not a standard service from COYO as the IT infrastructure needs to be configured via the server.
As a result, it also isn’t possible to configure a VPN tunnel for COYO Cloud instances.
Option available for: On-Premises and Private Cloud
Option available for: On-Premises and Private Cloud
Note:
COYO is unable to provide any guarantee for use by users with private cell phones. Depending on how you want to handle access, our recommendation is to use terms of use for the platform. These need to be clicked on before the employees use COYO for the first time.
We also recommend storing these in a location within COYO that is centrally accessible to all users, e.g. in an internal Knowledge Base.
As a rule, you should address and coordinate these topics together with your IT or IT Security department and/or Data Protection department.