Mobile Device Security Policy
Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. Desktops are routinely stationary devices and laptops are harder to lose than smartphones or tablets, being more sizable. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops and laptops are just as applicable to mobile devices.
The purpose of this policy from TechRepublic Premium is to provide guidelines for mobile device security needs to protect businesses and their employees.
Featured text from the policy:
REQUIREMENTS FOR THE IT DEPARTMENT
Where possible, the IT department should apply centralized security policies (such as via an Exchange server) to company-connected mobile devices. These policies should enforce a password/biometric policy, which will automatically lock the device after a one-minute period of inactivity and erase the contents of memory and storage after a maximum of 10 failed authentication attempts.
Password changes should be enforced at a minimum every 60 days. The policy should also include the ability to remotely erase (wipe) these devices in the event of loss or theft.
Enhance your security process with our nine-page template document. Previously priced at $99, this is now available for download at just $9. Alternatively, enjoy complimentary access with a Premium annual subscription. Click here to find out more.
TIME SAVED: Crafting this content required 16 hours of dedicated writing, editing and research. Benefit from our expertise and improve your security procedures.
Subscribe to the TechRepublic Premium Exclusives Newsletter
Save time with the latest TechRepublic Premium downloads, including original research, customizable IT policy templates, ready-made lunch-and-learn presentations, IT hiring tools, ROI calculators, and more. Exclusively for you! Delivered Tuesdays and Thursdays