About Us | Contact Us
View Cart

Portable Devices Security Procedure (Mobile Devices Policy)

By Michael Hartke | Wednesday, June 6, 2012 - Leave a Comment

Portable Devices Security Procedure (Mobile Devices Policy):  This user-level document governs how users are to use, secure, maintain, and retire a portable device.  It covers both authorized (BYOD . . . employee-owned) devices as well as issued (company-owned) devices.

This is the central non-technical control document for mobile device security and BYOD.   The required controls it establishes are worded as a trade-off: “if you enforce these controls you get to put company data on your phone.”

Many organizations may treat this as a policy document.   We don’t, as it only applies to users who have been approved for mobile devices, but it will be easy for you to modify this to turn it into a policy document.

Included in this template is the Agreement to comply with Portable Devices Security Procedure:   This agreement is very important so that employees understand their obligations, responsibilities, rights, and vulnerabilities.   The warnings in this agreement are paramount for a solid risk management approach, for warning employees of the pitfalls of remote wipe (you will lose your pictures and music), and also to smooth over some of the more unpopular inconveniences of the program (such as the right to audit).

All templates are color-coded, and don’t forget, updates are free for three years and our boilerplates all come with a 30 Day Guarantee!

Now only $80.00

_____________________________________________________

Save when you purchase the entire Mobile Devices Security kit!

Now only $85.00 (including tax!)

_____________________________________________________

Latest News
    The One Test… …Is there a Test that Covers 9/11’s of the Battle? Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Twenty years ago two geek-friends and I debated the following question:  “Is there an Audit Test that covers 9/11’s of the battle?” This […]
    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX infotex has just hired Tanvee Dhir, to be a new Data Security Analyst. “Tanvee is an outstanding addition to the team, bringing a new skillset we are eager to utilize.” says Chad Smith, NOC Manager of infotex. “I am really excited to be […]
    While we’re not a news service, we often use current events to comment on trends and our services. This blog is intended to get people thinking about topics and trends in Technology Risk Management, through our article reviews, as well as through original blog articles about current events and our MSSP services (such as our […]
    Seven Trends . . . that small bank Information Security Officers face in 2021 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Welcome to the Magnificent Seven, my annual predictive article about the seven trends in technology that will impact the Information Security Officers of […]
    Top Seven Risks . . . that small bank Information Security Officers face in 2021 Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Once again, I compile this list in preparation for updating our normal board of directors awareness training PowerPoints and movies and such. […]