Mobile Device PolicyMobile Device Access and Use Policy

New with Version 3.0 - All New Electronic Forms and fully compliant with mandated, ISO, and EU requirements - also comes as eBook

Order Mobile Device Policy  Download Selected Pages

Mobile Device Access and Use Policy - Every organization needs to identify and develop mobile security policies to be deployed which will provide adequate protection. The level of protection has to be aligned with the level of risk that your organization is willing to accept. These policies should ensure that the many regulatory or compliance concerns that might be applicable are addressed. The mobile security policy should be integrated within your overall information security policy framework.

Included with the policy are 4 electronic forms:

  • BYOD Access and Use Agreeement
  • Company Assest - Employee Control Log
  • Mobile Device Access and Agreement Form
  • Mobile Device Security and Compliance Checklist

Key elements to address in the mobile device security policy are:

  • Physical security of the device
  • Address lost or stolen devices
  • Acceptable uses of the device
  • Encryption
  • Password protection
  • Storage
  • Backup
  • Access Control
  • Authentication
  • Monitoring

The purpose of this policy is to define standards, procedures, and restrictions for end users who have specific and authorized business requirements to access enterprise data from a mobile device connected via a wireless or unmanaged network outside of ENTERPRISE's direct control. This policy applies to, but is not limited to, all devices and media that fit the following device classifications:

  • SmartPhones
  • PDAs
  • USB applications and data
  • Laptop/notebook/tablet computers
  • Ultra-mobile PCs (UMPC)
  • Mobile/cellular phones
  • Home or personal computers used to access enterprise resources
  • Any mobile device capable of storing corporate data and connecting to an unmanaged network

The policy applies to any hardware and related software that could be used to access enterprise resources, even if the equipment is not approved, owned, or supplied by ENTERPRISE.

A growing number of enterprise employees using mobile devices - ranging from ad hoc work from home due to temporary family situations to full-time telework/home work arrangements. In fact, a recent survey found that 23% of the North American and European enterprises (companies with 1,000 or more employees) responded that a significant portion of employees spend 20% or more of their working time working away from the office.

  • More North American than European enterprises support regular telecommuting. On average, 17% of employees at North American enterprises report having employees who spend at least 20% of their work time away from their normal work desk or work from home. This compares with an average of 14% of employees at the European enterprises.
  • European employers are more conservative than others about use of mobile devices.
  • Size doesn't play a big role in an enterprise's decision to support mobile devices. At companies with between 1,000 and 4,999 employees surveyed last year, an average of 16% of employees telecommute one or more days per week, compared with an average of 14% of employees at firms with between 5,000 and 19,999 employees, and an average of 18% of those working for organizations with 20,000 or more employees.
  • Firms with regular telecommuters have even more frequent travelers.

Mobile Device Access and Use Policy Template - This policy is 19 pages in length. It contains everything that an enterprise needs to implement a functioning and compliant mobile device and use process. Included are forms defining the mobile device environment. In addition there is a discussion of how and what to include in a customized BYOD policy.

Order Mobile Device Policy  Download Selected Pages

Elements of Mobility Security

As the traditional enterprise boundaries begin to fade, it is paramount that mobile devices and the sensitive information they contain be managed and protected. As a result, security perimeters must also expand beyond the internal network to these numerous critical endpoints.

Mobile Device Management

Mobile Device Management within organizations becomes more complex and important as both the number of devices and the amount of sensitive data stored on the devices increases. A lost or stolen device may compromise the critical data stored on it, unless there are processes and tools in place to protect it.

Mobile Device Asset Discovery and Inventory

The first step in securing your mobile organization network is the identification of the current inventory of mobile devices and OS clients that exist within your infrastructure. Next, you must integrate the mobile devices that have been identified in this process into your existing asset inventory database. Consider the following as you develop or update your mobile device asset inventory:

  • How will you identify the mobile assets?
  • What are the related assets to this mobile device, for example, additional memory cards?
  • How do you identify the asset owner and the business purpose of each device?

See also Mobile Device Security


Other Individual Policies

All of the policies that are provided here are contained within one or more of the templates that are on this site. These policies have been added as individual documents in MS WORD format for those clients who just need this particular policy. All policies are GDPR, Sarbanes-Oxley, HIPAA, PCI-DSS, and ISO compliant.

Read On Infrastructure Policies