All
All

Mobile Device Acceptable Use Policy Template

207 KB | 3 files |  DOC, PDF

Define standards, procedures and restrictions for end users who have legitimate business requirements to access corporate data from a mobile device connected to an unmanaged network outside of the company's direct control.

The purpose of this policy is to define standards, procedures and restrictions for end users who have legitimate business requirements to access corporate data from a mobile device connected to an unmanaged network outside of a company's direct control.

This mobile device policy applies to, but is not limited to, all devices and accompanying media that fit the following device classifications:

  • Mobile/cellular phones
  • Laptop/notebook/tablet computers
  • Smartphones and PDAs
  • Any mobile device capable of storing corporate data and connecting to an unmanaged network

The policy applies to any hardware and related software that could be used to access corporate resources, even if said equipment is not corporately sanctioned, owned or supplied.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • Mobile Device Acceptable Use Policy Template.doc
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.

All IT Downloads from Info-Tech Research Group» | Visit Info-Tech Research Group »

Related IT Downloads

Apple iPod touch Quick Reference Guide Apple iPod touch Quick Reference Guide

CustomGuide's Quick Reference for the iPod touch can get business users quickly acquainted with Apple's popular mobile device....  More >>

Apple iPad 2 Quick Reference Apple iPad 2 Quick Reference

If your business has adopted the newest tablet in Cupertino's stable, get the most out of it by putting this guide close at hand....  More >>

Cyber Threats to Mobile Phones Cyber Threats to Mobile Phones

The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data