Template Defines Acceptable Use of Mobile Devices, Strengthens Data Security

John Storts
Slide Show

Eight Steps to Enterprise Data Protection

Eight steps to developing an enterprise data security plan.

As an IT Manager (and probable gadget-lover), you know how convenient mobile devices are for getting work done while on the go. At the same time, you are also acutely aware of the risks of having company data stored on and retrieved by devices on unmanaged networks. That potential vulnerability makes creating an acceptable-use policy a wise move. This way, mobile users know exactly what is and isn't permitted on the corporate network, whether from a smartphone, laptop, tablet or PDA, and what measures need to be taken before attempting to connect using these devices. In turn, the IT department knows who plans to connect with what device so it can put appropriate security measures in place.


Info-Tech's "Mobile Device Acceptable Use Policy Template" helps you clearly communicate your organization's rules when it comes to using any mobile device to access corporate information via an unsecured network, whether the device is personally owned or supplied by the company. The template includes requirements for registering mobile devices with IT, installing a personal firewall, reporting lost or stolen devices and getting support. The goal is to prevent security breaches that "could result in loss of information, damage to critical applications, loss of revenue and damage to the company's public image."


Workers are going to use (or try to use) these devices for legitimate business purposes, often outside of direct IT control. Avoid the accompanying risks with a clear, comprehensive policy.


More from IT Business Edge and Our Network

'Securing the Borderless Network' Excerpt

Five Top Risks to Mobile Devices and How to Protect Them
Security Assessment Policy Template

The iPad (Not) at Work

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.