Effective Policy Manages Devices that Extend the Network

Susan Hall

In his post last September, "Mobile Policy Wonks Needed," blogger Carl Weinschenk makes the point that smaller businesses are adopting mobile technology beyond their ability to keep it secure. And having a comprehensive and effective policy for users remains key.


Weinschenk quotes Philippe Winthrop, an analyst for Strategy Analytics and author of "The Enterprise Mobility Policy Guidebook: Business Policy Edition," explaining why he wrote the book:

...less than half of companies I surveyed have a mobility policy in place. Then, when I talk to companies and they share with me what they actually include in their policy, it becomes pretty evident that they are struggling with a detailed policy document that they can track and enforce.

No doubt larger organizations are struggling as well. Indiana University's Information Technology Services has shared in the Knowledge Network its policy on the use of devices that can extend the university network. It says:

Certain network devices if not deployed and configured correctly, can cause service interruptions and make network problems difficult or impossible to isolate and identify. In addition, if not properly secured, these devices can give unauthorized users access to the university network. The installation of these devices must therefore be managed and coordinated.

The Knowledge Network also contains Indiana University policies on:

appropriate use of information technology resources.

misuse and abuse of information technology resources.

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.



Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.