Mobile Device Policy
The Mobile Device Policy communicates the company's position on the use and security of mobile devices such as laptops, PDAs, smart phones and mobile storage media (such as flash or USB drives).
As capabilities of mobile devices increase, and more and more data is stored on devices ranging from laptops/notebooks to smart phones, this data becomes both more important and more difficult to secure. This policy specifies to users the company's standards for the secure use of mobile devices.
A Mobile Device Policy developed with the InstantSecurityPolicy.com application will include the following detailed sections:
4.1. Physical Security
4.2. Data Security
4.2.2. PDAs/Smart Phones
4.2.3. Mobile Storage Media
4.2.4. Portable Media Players
4.2.5. Other Mobile Devices
4.3. Connecting to Unsecured Networks
4.4. General Guidelines
4.6. Applicability of Other Policies
7. Revision History
Available in the Gold Package only, this is a policy that is intended to be used by technical staff and management as well as distributed to end users.
Your custom Mobile Device Policy will be delivered immediately upon completion of the wizard via email, as both a PDF and an RTF file. RTF files are editable in all major processing programs, including Microsoft Word.
Our security policies were written based on a cohesive and integrated approach using security best practices stemming from the C-I-A triad of confidentiality, integrity, and availability. This approach aligns with both real-world and industry standard-based objectives, resulting in an invaluable resource for your security policy management. A Mobile Device Policy developed with the InstantSecurityPolicy.com wizard will provide the foundation for a realistic, practical implementation of your IT security policy program.
Please contact us if you have any questions about this policy.
InstantSecurityPolicy.com has delivered thousands of IT Security Policies to companies from 5 to 50,000 employees. The management of InstantSecurityPolicy.com has over 20 years of successful experience in the field of information security.