SlideShare une entreprise Scribd logo
1  sur  13
Mobile Device Policy Template
Purpose

This tool outlines the baseline behaviors required to ensure that employees, contractors
and related constituents who use mobile devices, including laptop computers, PDAs,
mobile phones, smartphones, and ultra-mobile PCs to access corporate resources for
business use do so in a safe, secure manner. It is designed to maximize the degree to
which private and confidential data is protected from both deliberate and inadvertent
exposure and/or breach. As a signed document, it is an addition to the library of
acceptable use policies on file within Human Resources that allow employee behaviors to
be consistently managed.


To use this tool, fill in the blanks indicated by square brackets and delete the introductory
and explanatory text in dark grey.
[Policy Name]


Mobile Device Use Policy


          By


   [Enter Name Here]




          For


   [Enter Name Here]
Effective Date:
Document Owner:
Version:
Version Date Revision / Description Author:




Approval:
Approver Title:
Approval Date:




Table of Contents


   1. Purpose                                 4




   2. Applicability                           5



   3. Responsibilities                        6



   4. Affected Technology                     6
5. Policy & Appropriate Use     7


    5.1 Access Control
    5.2 Security
    5.3 Help & Support
    5.4 Organizational Protocol



  6. Policy for Non-Compliance    11



  7. Employee Declaration         12




1. Purpose
The purpose of this policy is to define standards, procedures, and restrictions for end users
who have legitimate business requirements to access corporate data from a mobile device
connected to an unmanaged network outside of [company name]’s direct control. This
mobile device policy applies to, but is not limited to, all devices and accompanying media
that fit the following device classifications:

      Laptop/notebook/tablet computers.

      Ultra-mobile PCs (UMPC).

      Mobile/cellular phones.

      Smartphones.

      PDAs

      Home or personal computers used to access corporate resources.

      Any mobile device capable of storing corporate data and connecting to an
       unmanaged network.


The policy applies to any hardware and related software that could be used to access
corporate resources, even if said equipment is not corporately sanctioned, owned, or
supplied.

The overriding goal of this policy is to protect the integrity of the private and confidential
client and business data that resides within [company name]’s technology infrastructure.
This policy intends to prevent this data from being deliberately or inadvertently stored
insecurely on a mobile device or carried over an insecure network where it can potentially
be accessed by unsanctioned resources. A breach of this type could result in loss of
information, damage to critical applications, loss of revenue, and damage to the company’s
public image. Therefore, all users employing a mobile device connected to an unmanaged
network outside of [company name]’s direct control to backup, store, and otherwise access
corporate data of any type must adhere to company-defined processes for doing so.
2. Applicability

This policy applies to all [company name] employees, including full and part-time staff,
contractors, freelancers, and other agents who utilize either company-owned or personally-
owned mobile device to access, store, back up, relocate or access any organization or
client-specific data. Such access to this confidential data is a privilege, not a right, and
forms the basis of the trust [company name] has built with its clients, supply chain partners
and other constituents. Consequently, employment at [company name] does not
automatically guarantee the initial and ongoing ability to use these devices to gain access
to corporate networks and information.

It addresses a range of threats to – or related to the use of – enterprise data:


Threat          Description
Loss            Devices used to transfer or transport work files could be lost or stolen.

Theft           Sensitive corporate data is deliberately stolen and sold by an employee.

Copyright       Software copied onto a mobile device could violate licensing.

Malware         Viruses, Trojans, Worms, Spyware and other threats could be introduced via a
                mobile device.

Compliance      Loss or theft of financial and/or personal and confidential data could expose the
                enterprise to the risk of non-compliance with various identity theft and privacy
                laws.


Addition of new hardware, software, and/or related components to provide additional
mobile device connectivity will be managed at the sole discretion of IT. Non-sanctioned
use of mobile devices to back up, store, and otherwise access any enterprise-related data is
strictly forbidden.
This policy is complementary to any previously implemented policies dealing specifically
with data access, data storage, data movement, and connectivity of mobile devices to any
element of the enterprise network.




3. Responsibilities

The [title, example: VP, Finance] of [company name] has the overall responsibility for the
confidentiality, integrity, and availability of corporate data.

The [title, example: VP, Finance], [company name] has delegated the execution and
maintenance of Information Technology and Information Systems to the [title, example
CIO].

Other IT, IS, and ICT staff under the direction of the [title, example: CIO] are responsible for
following the procedures and policies within Information Technology and Information
Systems.

All [company name] employees are responsible to act in accordance with company policies
and procedures.




4. Affected Technology

Connectivity of all mobile devices will be centrally managed by [company name]’s IT
department and will utilize authentication and strong encryption measures. Although IT is
not able to directly manage external devices – such as home PCs – which may require
connectivity to the corporate network, end users are expected to adhere to the same
security protocols when connected to non-corporate equipment. Failure to do so will result
in immediate suspension of all network access privileges so as to protect the company’s
infrastructure.
5. Policy and Appropriate Use

It is the responsibility of any employee of [company name] who uses a mobile device to
access corporate resources to ensure that all security protocols normally used in the
management of data on conventional storage infrastructure are also applied here. It is
imperative that any mobile device that is used to conduct [company name] business be
utilized appropriately, responsibly, and ethically. Failure to do so will result in immediate
suspension of that user’s account. Based on this, the following rules must be observed:




5.1 Access Control

   A. IT reserves the right to refuse, by physical and non-physical means, the ability to
      connect mobile devices to corporate and corporate-connected infrastructure. IT will
      engage in such action if it feels such equipment is being used in such a way that
      puts the company’s systems, data, users, and clients at risk.

   B. Prior to initial use on the corporate network or related infrastructure, all mobile
      devices must be registered with IT. [Company name] will maintain a list of approved
      mobile devices and related software applications and utilities, and it will be stored
      [file location or URL]. Devices that are not on this list may not be connected to
      corporate infrastructure. If your preferred device does not appear on this list, contact
      the help desk at [e-mail address] or [phone number]. Although IT currently allows
      only listed devices to be connected to enterprise infrastructure, it reserves the right
      to update this list in future.

   C. End users who wish to connect such devices to non-corporate network infrastructure
      to gain access to enterprise data must employ, for their devices and related
      infrastructure, a company-approved personal firewall and any other security measure
      deemed necessary by the IT department. Enterprise data is not to be accessed on
      any hardware that fails to meet [company name]’s established enterprise IT security
      standards.
D. All mobile devices attempting to connect to the corporate network through an
     unmanaged network (i.e. the Internet) will be inspected using technology centrally
     managed by [company name]’s IT department. Devices that have not been
     previously approved by IT, are not in compliance with IT’s security policies, or
     represent any threat to the corporate network or data will not be allowed to
     connect. Laptop computers or personal PCs may only access the corporate network
     and data using a Secure Socket Layer (SSL) Virtual Private Network (VPN)
     connection. The SSL VPN portal Web address will be provided to users as required.
     Smart mobile devices such as smartphones, PDAs, and UMPCs will access the
     corporate network and data using Mobile VPN software installed on the device by
     IT.




5.2 Security

  E. Employees using mobile devices and related software for network and data access
     will, without exception, use secure data management procedures. All mobile devices
     must be protected by a strong password, and all data stored on the device must be
     encrypted using strong encryption. See the [company name]’s password policy for
     additional background. Employees agree to never disclose their passwords to
     anyone, particularly to family members if business work is conducted from home.

  F. All users of mobile devices must employ reasonable physical security measures. End
     users are expected to secure all such devices used for this activity whether or not
     they are actually in use and/or being carried. This includes, but is not limited to,
     passwords, encryption, and physical control of such devices whenever they contain
     enterprise data. Any non-corporate computers used to synchronize with these
     devices will have installed anti-virus and anti-malware software deemed necessary by
     [company name]’s IT department. Anti-virus signature files on any additional client
     machines – such as a home PC – on which this media will be accessed, must be up
     to date.
G. Passwords and other confidential data as defined by [company name]’s IT
     department are not to be stored unencrypted on mobile devices.

H. Any mobile device that is being used to store [company name] data must adhere to
     the authentication requirements of [company name]’s IT department. In addition, all
     hardware security configurations (personal or company-owned) must be pre-
     approved by [company name]’s IT department before any enterprise data-carrying
     device can be connected to it.

I.   IT will manage security policies, network, application, and data access centrally using
     whatever technology solutions it deems suitable. Any attempt to contravene or
     bypass said security implementation will be deemed an intrusion attempt and will be
     dealt with in accordance with [company name]’s overarching security policy.

J. Employees, contractors, and temporary staff will follow all enterprise-sanctioned data
     removal procedures to permanently erase company-specific data from such devices
     once their use is no longer required. See [file location or URL] for detailed data wipe
     procedures for mobile devices.

K. In the event of a lost or stolen mobile device it is incumbent on the user to report
     this to IT immediately. The device will be remotely wiped of all data and locked to
     prevent access by anyone other than IT. If the device is recovered, it can be
     submitted to IT for re-provisioning.

        [Note: The following policy statement is optional. If the organization is concerned
        about company locations being identified in employee social media posts sent
        via GPS-enabled devices, include this statement.]

L. Usage of location-based services and mobile check-in services, which leverage
     device GPS capabilities to share real-time user location with external parties, is
     prohibited within the workplace. This applies to both corporate-owned and personal
     mobile devices being used within the company premises.
5.3 Help & Support

  M. [Company name]’s IT department will support its sanctioned hardware and software,
     but is not accountable for conflicts or problems caused by the use of unsanctioned
     media, hardware, or software. This applies even to devices already known to the IT
     department.

  N. Employees, contractors, and temporary staff will make no modifications of any kind
     to company-owned and installed hardware or software without the express approval
     of [company name]’s IT department. This includes, but is not limited to, any
     reconfiguration of the mobile device.

  O. IT reserves the right, through policy enforcement and any other means it deems
     necessary, to limit the ability of end users to transfer data to and from specific
     resources on the enterprise network.




5.4 Organizational Protocol

  P. IT can and will establish audit trails and these will be accessed, published and used
     without notice. Such trails will be able to track the attachment of an external device
     to a PC, and the resulting reports may be used for investigation of possible breaches
     and/or misuse. The end user agrees to and accepts that his or her access and/or
     connection to [company name]’s networks may be monitored to record dates, times,
     duration of access, etc., in order to identify unusual usage patterns or other
     suspicious activity. This is done in order to identify accounts/computers that may
     have been compromised by external parties. In all cases, data protection remains
     [company name]’s highest priority.
Q. The end user agrees to immediately report to his/her manager and [company
        name]’s IT department any incident or suspected incidents of unauthorized data
        access, data loss, and/or disclosure of company resources, databases, networks, etc.

   R.   [Company name] [will/will not] reimburse employees if they choose to purchase
        their own mobile devices. Users [will/will not] be allowed to expense mobile network
        usage costs [up to a maximum of $X per month].

   S. Every mobile device user will be entitled to a training session around this policy.
        While a mobile device user will not be granted access to corporate resources using a
        mobile device without accepting the terms and conditions of this policy, employees
        are entitled to decline signing this policy if they do not understand the policy or are
        uncomfortable with its contents.

   T. Any questions relating to this policy should be directed to [Name] in IT, at [phone
        number] or [e-mail address].




6. Policy Non-Compliance

Failure to comply with the Mobile Device Acceptable Use Policy may, at the full discretion
of the organization, result in the suspension of any or all technology use and connectivity
privileges, disciplinary action, and possibly termination of employment.


The (i) Vice-President of Finance, (ii) Chief Operating Officer, and (iii) immediate Manager
or Director will be advised of breaches of this policy and will be responsible for
appropriate remedial action which may include disciplinary action, including suspension or
termination of employment.
7. Employee Declaration

I, [employee name], have read and understand the above Mobile Device Acceptable Use
Policy, and consent to adhere to the rules outlined therein.




___________________________________           _______________________________
      Employee Signature                                       Date




___________________________________           _______________________________
       Manager Signature                                       Date




___________________________________           _______________________________
    IT Administrator Signature                                 Date

Contenu connexe

Tendances

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak preventionAriel Evans
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Preventiondj1arry
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxMukesh Pant
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from SymantecArrow ECS UK
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)Radhakrishnan Govindan
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Trainingnovemberchild
 

Tendances (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
DLP Data leak prevention
DLP Data leak preventionDLP Data leak prevention
DLP Data leak prevention
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
ISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptxISMS User_Awareness Training.pptx
ISMS User_Awareness Training.pptx
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Security Awareness & Training
Security Awareness & TrainingSecurity Awareness & Training
Security Awareness & Training
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

En vedette

Social Media Policy and Guidelines
Social Media Policy and GuidelinesSocial Media Policy and Guidelines
Social Media Policy and GuidelinesDemand Metric
 
Group Policy Preferences, Templates, And Scripting
Group Policy Preferences, Templates, And ScriptingGroup Policy Preferences, Templates, And Scripting
Group Policy Preferences, Templates, And ScriptingMicrosoft TechNet
 
Social Media Policy Template
Social Media Policy TemplateSocial Media Policy Template
Social Media Policy TemplateEric Schwartzman
 
PolicyPLUS Webinar - Effective Policy Writing and Management
PolicyPLUS Webinar - Effective Policy Writing and ManagementPolicyPLUS Webinar - Effective Policy Writing and Management
PolicyPLUS Webinar - Effective Policy Writing and ManagementQFHC
 
Policy brief template and guide
Policy brief template and guidePolicy brief template and guide
Policy brief template and guideRuth Dearnley
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregonJulie Bozzi, PfPM, PMP
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy ConceptsRob Dunn
 
Company Vehicle Use Agreement
Company Vehicle Use AgreementCompany Vehicle Use Agreement
Company Vehicle Use AgreementJohn Keller
 

En vedette (9)

Social Media Policy and Guidelines
Social Media Policy and GuidelinesSocial Media Policy and Guidelines
Social Media Policy and Guidelines
 
Group Policy Preferences, Templates, And Scripting
Group Policy Preferences, Templates, And ScriptingGroup Policy Preferences, Templates, And Scripting
Group Policy Preferences, Templates, And Scripting
 
Policy Template
Policy TemplatePolicy Template
Policy Template
 
Social Media Policy Template
Social Media Policy TemplateSocial Media Policy Template
Social Media Policy Template
 
PolicyPLUS Webinar - Effective Policy Writing and Management
PolicyPLUS Webinar - Effective Policy Writing and ManagementPolicyPLUS Webinar - Effective Policy Writing and Management
PolicyPLUS Webinar - Effective Policy Writing and Management
 
Policy brief template and guide
Policy brief template and guidePolicy brief template and guide
Policy brief template and guide
 
Backup policy template julie bozzi oregon
Backup policy template   julie bozzi oregonBackup policy template   julie bozzi oregon
Backup policy template julie bozzi oregon
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy Concepts
 
Company Vehicle Use Agreement
Company Vehicle Use AgreementCompany Vehicle Use Agreement
Company Vehicle Use Agreement
 

Similaire à Mobile Device Policy Template

Exemplo de política BYOD
Exemplo de política BYODExemplo de política BYOD
Exemplo de política BYODFernando Palma
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxtodd331
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicAlleneMcclendon878
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access policARIV4
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxtoltonkendal
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet SupportFelix Yanko
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Securitynexxtep
 
Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Jerry Pollio
 
Week - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docxWeek - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docxmelbruce90096
 

Similaire à Mobile Device Policy Template (20)

Exemplo de política BYOD
Exemplo de política BYODExemplo de política BYOD
Exemplo de política BYOD
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docxSample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
Sample Security PoliciesAcceptable_Encryption_Policy.docAccep.docx
 
IT Policy
IT Policy IT Policy
IT Policy
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Consensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access PolicConsensus Policy Resource CommunityRemote Access Polic
Consensus Policy Resource CommunityRemote Access Polic
 
Consensus policy resource community remote access polic
Consensus policy resource community remote access policConsensus policy resource community remote access polic
Consensus policy resource community remote access polic
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
 
IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
BYOD
BYODBYOD
BYOD
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Mobile Phone & Tablet Support
Mobile Phone & Tablet SupportMobile Phone & Tablet Support
Mobile Phone & Tablet Support
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Capstone Finished
Capstone FinishedCapstone Finished
Capstone Finished
 
Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016Schooley mitchell mobile device policy white paper 2016
Schooley mitchell mobile device policy white paper 2016
 
Week - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docxWeek - 5Report.docxjustify and support the relationship bet.docx
Week - 5Report.docxjustify and support the relationship bet.docx
 

Plus de Demand Metric

The Impact of COVID-19 in B2B Marketing
The Impact of COVID-19 in B2B MarketingThe Impact of COVID-19 in B2B Marketing
The Impact of COVID-19 in B2B MarketingDemand Metric
 
Infographic Return Path Email Engagement
Infographic Return Path Email EngagementInfographic Return Path Email Engagement
Infographic Return Path Email EngagementDemand Metric
 
Infographic Vidyard Video Marketing 2018
Infographic Vidyard Video Marketing 2018Infographic Vidyard Video Marketing 2018
Infographic Vidyard Video Marketing 2018Demand Metric
 
Digital Marketing Best Practices Guide
Digital Marketing Best Practices GuideDigital Marketing Best Practices Guide
Digital Marketing Best Practices GuideDemand Metric
 
Content Marketing Solution Study
Content Marketing Solution StudyContent Marketing Solution Study
Content Marketing Solution StudyDemand Metric
 
SEO Technology Overview
SEO Technology OverviewSEO Technology Overview
SEO Technology OverviewDemand Metric
 
State of Video Marketing 2017
State of Video Marketing 2017State of Video Marketing 2017
State of Video Marketing 2017Demand Metric
 
Sales Enablement Maturity Model
Sales Enablement Maturity ModelSales Enablement Maturity Model
Sales Enablement Maturity ModelDemand Metric
 
Public Relations Maturity Model
Public Relations Maturity ModelPublic Relations Maturity Model
Public Relations Maturity ModelDemand Metric
 
Email Marketing Maturity Model
Email Marketing Maturity ModelEmail Marketing Maturity Model
Email Marketing Maturity ModelDemand Metric
 
Customer Engagement Maturity Model
Customer Engagement Maturity ModelCustomer Engagement Maturity Model
Customer Engagement Maturity ModelDemand Metric
 
Formalizing the Sales Support Function How-To Guide
Formalizing the Sales Support Function How-To GuideFormalizing the Sales Support Function How-To Guide
Formalizing the Sales Support Function How-To GuideDemand Metric
 
How to Launch a Mobile App Guide How-To Guide
How to Launch a Mobile App Guide How-To GuideHow to Launch a Mobile App Guide How-To Guide
How to Launch a Mobile App Guide How-To GuideDemand Metric
 
Getting Started with Agile Marketing How-To Guide
Getting Started with Agile Marketing How-To GuideGetting Started with Agile Marketing How-To Guide
Getting Started with Agile Marketing How-To GuideDemand Metric
 
Entering the European Market Successfully How-To Guide
Entering the European Market Successfully How-To GuideEntering the European Market Successfully How-To Guide
Entering the European Market Successfully How-To GuideDemand Metric
 
Driving SEO with Press Releases How-To Guide
Driving SEO with Press Releases How-To GuideDriving SEO with Press Releases How-To Guide
Driving SEO with Press Releases How-To GuideDemand Metric
 
Calculating Customer Lifetime Value How-To Guide
Calculating Customer Lifetime Value How-To GuideCalculating Customer Lifetime Value How-To Guide
Calculating Customer Lifetime Value How-To GuideDemand Metric
 
Lead Scoring: Five Steps to Getting Started How-To Guide
Lead Scoring: Five Steps to Getting Started How-To GuideLead Scoring: Five Steps to Getting Started How-To Guide
Lead Scoring: Five Steps to Getting Started How-To GuideDemand Metric
 
Social CRM Best Practices How-To Guide
Social CRM Best Practices How-To GuideSocial CRM Best Practices How-To Guide
Social CRM Best Practices How-To GuideDemand Metric
 
Marketing Resource Management How-To Guide
Marketing Resource Management How-To GuideMarketing Resource Management How-To Guide
Marketing Resource Management How-To GuideDemand Metric
 

Plus de Demand Metric (20)

The Impact of COVID-19 in B2B Marketing
The Impact of COVID-19 in B2B MarketingThe Impact of COVID-19 in B2B Marketing
The Impact of COVID-19 in B2B Marketing
 
Infographic Return Path Email Engagement
Infographic Return Path Email EngagementInfographic Return Path Email Engagement
Infographic Return Path Email Engagement
 
Infographic Vidyard Video Marketing 2018
Infographic Vidyard Video Marketing 2018Infographic Vidyard Video Marketing 2018
Infographic Vidyard Video Marketing 2018
 
Digital Marketing Best Practices Guide
Digital Marketing Best Practices GuideDigital Marketing Best Practices Guide
Digital Marketing Best Practices Guide
 
Content Marketing Solution Study
Content Marketing Solution StudyContent Marketing Solution Study
Content Marketing Solution Study
 
SEO Technology Overview
SEO Technology OverviewSEO Technology Overview
SEO Technology Overview
 
State of Video Marketing 2017
State of Video Marketing 2017State of Video Marketing 2017
State of Video Marketing 2017
 
Sales Enablement Maturity Model
Sales Enablement Maturity ModelSales Enablement Maturity Model
Sales Enablement Maturity Model
 
Public Relations Maturity Model
Public Relations Maturity ModelPublic Relations Maturity Model
Public Relations Maturity Model
 
Email Marketing Maturity Model
Email Marketing Maturity ModelEmail Marketing Maturity Model
Email Marketing Maturity Model
 
Customer Engagement Maturity Model
Customer Engagement Maturity ModelCustomer Engagement Maturity Model
Customer Engagement Maturity Model
 
Formalizing the Sales Support Function How-To Guide
Formalizing the Sales Support Function How-To GuideFormalizing the Sales Support Function How-To Guide
Formalizing the Sales Support Function How-To Guide
 
How to Launch a Mobile App Guide How-To Guide
How to Launch a Mobile App Guide How-To GuideHow to Launch a Mobile App Guide How-To Guide
How to Launch a Mobile App Guide How-To Guide
 
Getting Started with Agile Marketing How-To Guide
Getting Started with Agile Marketing How-To GuideGetting Started with Agile Marketing How-To Guide
Getting Started with Agile Marketing How-To Guide
 
Entering the European Market Successfully How-To Guide
Entering the European Market Successfully How-To GuideEntering the European Market Successfully How-To Guide
Entering the European Market Successfully How-To Guide
 
Driving SEO with Press Releases How-To Guide
Driving SEO with Press Releases How-To GuideDriving SEO with Press Releases How-To Guide
Driving SEO with Press Releases How-To Guide
 
Calculating Customer Lifetime Value How-To Guide
Calculating Customer Lifetime Value How-To GuideCalculating Customer Lifetime Value How-To Guide
Calculating Customer Lifetime Value How-To Guide
 
Lead Scoring: Five Steps to Getting Started How-To Guide
Lead Scoring: Five Steps to Getting Started How-To GuideLead Scoring: Five Steps to Getting Started How-To Guide
Lead Scoring: Five Steps to Getting Started How-To Guide
 
Social CRM Best Practices How-To Guide
Social CRM Best Practices How-To GuideSocial CRM Best Practices How-To Guide
Social CRM Best Practices How-To Guide
 
Marketing Resource Management How-To Guide
Marketing Resource Management How-To GuideMarketing Resource Management How-To Guide
Marketing Resource Management How-To Guide
 

Dernier

Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Leko Durda
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...ur8mqw8e
 
call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..nishakur201
 
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road GurgaonCheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road GurgaonDelhi Call girls
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭o8wvnojp
 
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual serviceanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female serviceanilsa9823
 
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service DhuleDhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhulesrsj9000
 
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...CIOWomenMagazine
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushShivain97
 
Lilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxLilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxABMWeaklings
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfssusere8ea60
 
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girlsPooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceanilsa9823
 
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,dollysharma2066
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfJess Walker
 
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改atducpo
 
Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666nishakur201
 

Dernier (20)

Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
 
escort service sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
escort service  sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974escort service  sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
escort service sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
 
call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..
 
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road GurgaonCheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Mg Road Gurgaon
 
办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭办理西悉尼大学毕业证成绩单、制作假文凭
办理西悉尼大学毕业证成绩单、制作假文凭
 
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Rajajipuram Lucknow best sexual service
 
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Adil Nagar Lucknow best Female service
 
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service DhuleDhule Call Girls #9907093804 Contact Number Escorts Service Dhule
Dhule Call Girls #9907093804 Contact Number Escorts Service Dhule
 
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by Mindbrush
 
Lilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptxLilac Illustrated Social Psychology Presentation.pptx
Lilac Illustrated Social Psychology Presentation.pptx
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
 
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
 
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
 
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Tingre Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
 
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
 
Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666
 

Mobile Device Policy Template

  • 1. Mobile Device Policy Template Purpose This tool outlines the baseline behaviors required to ensure that employees, contractors and related constituents who use mobile devices, including laptop computers, PDAs, mobile phones, smartphones, and ultra-mobile PCs to access corporate resources for business use do so in a safe, secure manner. It is designed to maximize the degree to which private and confidential data is protected from both deliberate and inadvertent exposure and/or breach. As a signed document, it is an addition to the library of acceptable use policies on file within Human Resources that allow employee behaviors to be consistently managed. To use this tool, fill in the blanks indicated by square brackets and delete the introductory and explanatory text in dark grey.
  • 2. [Policy Name] Mobile Device Use Policy By [Enter Name Here] For [Enter Name Here]
  • 3. Effective Date: Document Owner: Version: Version Date Revision / Description Author: Approval: Approver Title: Approval Date: Table of Contents 1. Purpose 4 2. Applicability 5 3. Responsibilities 6 4. Affected Technology 6
  • 4. 5. Policy & Appropriate Use 7 5.1 Access Control 5.2 Security 5.3 Help & Support 5.4 Organizational Protocol 6. Policy for Non-Compliance 11 7. Employee Declaration 12 1. Purpose
  • 5. The purpose of this policy is to define standards, procedures, and restrictions for end users who have legitimate business requirements to access corporate data from a mobile device connected to an unmanaged network outside of [company name]’s direct control. This mobile device policy applies to, but is not limited to, all devices and accompanying media that fit the following device classifications:  Laptop/notebook/tablet computers.  Ultra-mobile PCs (UMPC).  Mobile/cellular phones.  Smartphones.  PDAs  Home or personal computers used to access corporate resources.  Any mobile device capable of storing corporate data and connecting to an unmanaged network. The policy applies to any hardware and related software that could be used to access corporate resources, even if said equipment is not corporately sanctioned, owned, or supplied. The overriding goal of this policy is to protect the integrity of the private and confidential client and business data that resides within [company name]’s technology infrastructure. This policy intends to prevent this data from being deliberately or inadvertently stored insecurely on a mobile device or carried over an insecure network where it can potentially be accessed by unsanctioned resources. A breach of this type could result in loss of information, damage to critical applications, loss of revenue, and damage to the company’s public image. Therefore, all users employing a mobile device connected to an unmanaged network outside of [company name]’s direct control to backup, store, and otherwise access corporate data of any type must adhere to company-defined processes for doing so.
  • 6. 2. Applicability This policy applies to all [company name] employees, including full and part-time staff, contractors, freelancers, and other agents who utilize either company-owned or personally- owned mobile device to access, store, back up, relocate or access any organization or client-specific data. Such access to this confidential data is a privilege, not a right, and forms the basis of the trust [company name] has built with its clients, supply chain partners and other constituents. Consequently, employment at [company name] does not automatically guarantee the initial and ongoing ability to use these devices to gain access to corporate networks and information. It addresses a range of threats to – or related to the use of – enterprise data: Threat Description Loss Devices used to transfer or transport work files could be lost or stolen. Theft Sensitive corporate data is deliberately stolen and sold by an employee. Copyright Software copied onto a mobile device could violate licensing. Malware Viruses, Trojans, Worms, Spyware and other threats could be introduced via a mobile device. Compliance Loss or theft of financial and/or personal and confidential data could expose the enterprise to the risk of non-compliance with various identity theft and privacy laws. Addition of new hardware, software, and/or related components to provide additional mobile device connectivity will be managed at the sole discretion of IT. Non-sanctioned use of mobile devices to back up, store, and otherwise access any enterprise-related data is strictly forbidden.
  • 7. This policy is complementary to any previously implemented policies dealing specifically with data access, data storage, data movement, and connectivity of mobile devices to any element of the enterprise network. 3. Responsibilities The [title, example: VP, Finance] of [company name] has the overall responsibility for the confidentiality, integrity, and availability of corporate data. The [title, example: VP, Finance], [company name] has delegated the execution and maintenance of Information Technology and Information Systems to the [title, example CIO]. Other IT, IS, and ICT staff under the direction of the [title, example: CIO] are responsible for following the procedures and policies within Information Technology and Information Systems. All [company name] employees are responsible to act in accordance with company policies and procedures. 4. Affected Technology Connectivity of all mobile devices will be centrally managed by [company name]’s IT department and will utilize authentication and strong encryption measures. Although IT is not able to directly manage external devices – such as home PCs – which may require connectivity to the corporate network, end users are expected to adhere to the same security protocols when connected to non-corporate equipment. Failure to do so will result in immediate suspension of all network access privileges so as to protect the company’s infrastructure.
  • 8. 5. Policy and Appropriate Use It is the responsibility of any employee of [company name] who uses a mobile device to access corporate resources to ensure that all security protocols normally used in the management of data on conventional storage infrastructure are also applied here. It is imperative that any mobile device that is used to conduct [company name] business be utilized appropriately, responsibly, and ethically. Failure to do so will result in immediate suspension of that user’s account. Based on this, the following rules must be observed: 5.1 Access Control A. IT reserves the right to refuse, by physical and non-physical means, the ability to connect mobile devices to corporate and corporate-connected infrastructure. IT will engage in such action if it feels such equipment is being used in such a way that puts the company’s systems, data, users, and clients at risk. B. Prior to initial use on the corporate network or related infrastructure, all mobile devices must be registered with IT. [Company name] will maintain a list of approved mobile devices and related software applications and utilities, and it will be stored [file location or URL]. Devices that are not on this list may not be connected to corporate infrastructure. If your preferred device does not appear on this list, contact the help desk at [e-mail address] or [phone number]. Although IT currently allows only listed devices to be connected to enterprise infrastructure, it reserves the right to update this list in future. C. End users who wish to connect such devices to non-corporate network infrastructure to gain access to enterprise data must employ, for their devices and related infrastructure, a company-approved personal firewall and any other security measure deemed necessary by the IT department. Enterprise data is not to be accessed on any hardware that fails to meet [company name]’s established enterprise IT security standards.
  • 9. D. All mobile devices attempting to connect to the corporate network through an unmanaged network (i.e. the Internet) will be inspected using technology centrally managed by [company name]’s IT department. Devices that have not been previously approved by IT, are not in compliance with IT’s security policies, or represent any threat to the corporate network or data will not be allowed to connect. Laptop computers or personal PCs may only access the corporate network and data using a Secure Socket Layer (SSL) Virtual Private Network (VPN) connection. The SSL VPN portal Web address will be provided to users as required. Smart mobile devices such as smartphones, PDAs, and UMPCs will access the corporate network and data using Mobile VPN software installed on the device by IT. 5.2 Security E. Employees using mobile devices and related software for network and data access will, without exception, use secure data management procedures. All mobile devices must be protected by a strong password, and all data stored on the device must be encrypted using strong encryption. See the [company name]’s password policy for additional background. Employees agree to never disclose their passwords to anyone, particularly to family members if business work is conducted from home. F. All users of mobile devices must employ reasonable physical security measures. End users are expected to secure all such devices used for this activity whether or not they are actually in use and/or being carried. This includes, but is not limited to, passwords, encryption, and physical control of such devices whenever they contain enterprise data. Any non-corporate computers used to synchronize with these devices will have installed anti-virus and anti-malware software deemed necessary by [company name]’s IT department. Anti-virus signature files on any additional client machines – such as a home PC – on which this media will be accessed, must be up to date.
  • 10. G. Passwords and other confidential data as defined by [company name]’s IT department are not to be stored unencrypted on mobile devices. H. Any mobile device that is being used to store [company name] data must adhere to the authentication requirements of [company name]’s IT department. In addition, all hardware security configurations (personal or company-owned) must be pre- approved by [company name]’s IT department before any enterprise data-carrying device can be connected to it. I. IT will manage security policies, network, application, and data access centrally using whatever technology solutions it deems suitable. Any attempt to contravene or bypass said security implementation will be deemed an intrusion attempt and will be dealt with in accordance with [company name]’s overarching security policy. J. Employees, contractors, and temporary staff will follow all enterprise-sanctioned data removal procedures to permanently erase company-specific data from such devices once their use is no longer required. See [file location or URL] for detailed data wipe procedures for mobile devices. K. In the event of a lost or stolen mobile device it is incumbent on the user to report this to IT immediately. The device will be remotely wiped of all data and locked to prevent access by anyone other than IT. If the device is recovered, it can be submitted to IT for re-provisioning. [Note: The following policy statement is optional. If the organization is concerned about company locations being identified in employee social media posts sent via GPS-enabled devices, include this statement.] L. Usage of location-based services and mobile check-in services, which leverage device GPS capabilities to share real-time user location with external parties, is prohibited within the workplace. This applies to both corporate-owned and personal mobile devices being used within the company premises.
  • 11. 5.3 Help & Support M. [Company name]’s IT department will support its sanctioned hardware and software, but is not accountable for conflicts or problems caused by the use of unsanctioned media, hardware, or software. This applies even to devices already known to the IT department. N. Employees, contractors, and temporary staff will make no modifications of any kind to company-owned and installed hardware or software without the express approval of [company name]’s IT department. This includes, but is not limited to, any reconfiguration of the mobile device. O. IT reserves the right, through policy enforcement and any other means it deems necessary, to limit the ability of end users to transfer data to and from specific resources on the enterprise network. 5.4 Organizational Protocol P. IT can and will establish audit trails and these will be accessed, published and used without notice. Such trails will be able to track the attachment of an external device to a PC, and the resulting reports may be used for investigation of possible breaches and/or misuse. The end user agrees to and accepts that his or her access and/or connection to [company name]’s networks may be monitored to record dates, times, duration of access, etc., in order to identify unusual usage patterns or other suspicious activity. This is done in order to identify accounts/computers that may have been compromised by external parties. In all cases, data protection remains [company name]’s highest priority.
  • 12. Q. The end user agrees to immediately report to his/her manager and [company name]’s IT department any incident or suspected incidents of unauthorized data access, data loss, and/or disclosure of company resources, databases, networks, etc. R. [Company name] [will/will not] reimburse employees if they choose to purchase their own mobile devices. Users [will/will not] be allowed to expense mobile network usage costs [up to a maximum of $X per month]. S. Every mobile device user will be entitled to a training session around this policy. While a mobile device user will not be granted access to corporate resources using a mobile device without accepting the terms and conditions of this policy, employees are entitled to decline signing this policy if they do not understand the policy or are uncomfortable with its contents. T. Any questions relating to this policy should be directed to [Name] in IT, at [phone number] or [e-mail address]. 6. Policy Non-Compliance Failure to comply with the Mobile Device Acceptable Use Policy may, at the full discretion of the organization, result in the suspension of any or all technology use and connectivity privileges, disciplinary action, and possibly termination of employment. The (i) Vice-President of Finance, (ii) Chief Operating Officer, and (iii) immediate Manager or Director will be advised of breaches of this policy and will be responsible for appropriate remedial action which may include disciplinary action, including suspension or termination of employment.
  • 13. 7. Employee Declaration I, [employee name], have read and understand the above Mobile Device Acceptable Use Policy, and consent to adhere to the rules outlined therein. ___________________________________ _______________________________ Employee Signature Date ___________________________________ _______________________________ Manager Signature Date ___________________________________ _______________________________ IT Administrator Signature Date