In his post last September, "Mobile Policy Wonks Needed," blogger Carl Weinschenk makes the point that smaller businesses are adopting mobile technology beyond their ability to keep it secure. And having a comprehensive and effective policy for users remains key.
Weinschenk quotes Philippe Winthrop, an analyst for Strategy Analytics and author of "The Enterprise Mobility Policy Guidebook: Business Policy Edition," explaining why he wrote the book:
...less than half of companies I surveyed have a mobility policy in place. Then, when I talk to companies and they share with me what they actually include in their policy, it becomes pretty evident that they are struggling with a detailed policy document that they can track and enforce.
No doubt larger organizations are struggling as well. Indiana University's Information Technology Services has shared in the Knowledge Network its policy on the use of devices that can extend the university network. It says:
Certain network devices if not deployed and configured correctly, can cause service interruptions and make network problems difficult or impossible to isolate and identify. In addition, if not properly secured, these devices can give unauthorized users access to the university network. The installation of these devices must therefore be managed and coordinated.
The Knowledge Network also contains Indiana University policies on: