Attend IT Limited Blog

Set a Mobile Policy for Your Own Good

Set a Mobile Policy for Your Own Good

Mobile devices (as their name would suggest) go everywhere, including the modern office. As such, it is likely that your employees will want to take advantage of their capabilities to accomplish more of their responsibilities and tasks. This can be advantageous to your business, assuming that you have a well-thought-out mobile device policy in place.

Let’s discuss a few things that need to be included in one of these policies so you can make yours as effective as it can be (whether you’re first implementing it or you’ve had one for a while that needs a refresh).

Keeping Things Secure

While mobile devices can provide considerable benefits to your business, these benefits will be moot if your security is compromised via these devices. Therefore, you need to make sure that your mobile device policies contain guidelines to help - and yes, make - your employees use their devices more securely. While these examples aren’t a comprehensive list of precautions to make (and the same can be said for any of the examples in this blog), they do help illustrate the kinds of precautions and restrictions you will have to enforce:

  • All mobile devices must be protected by a password that meets the standards set by your company’s guidelines, and set to lock automatically if idle for a set amount of time.
  • Any applications must be approved by the company before they can be installed and used for work purposes.
  • Any devices not included in the BYOD policy, or are not supported by it, may not connect to the business’ network.
  • If a device is misplaced, IT detects a threat on it, or the owner leaves the company, IT may wipe the device to protect company data.

Managing Risks

Of course, while you always need to have security measures in place, it can greatly help to have the means of minimizing threats before any can materialize… especially those that originate from inside your organization. Your mobile device policy is a good place to outline the protections you have in place, and what you reserve the right to do with them to protect the good of the company. For instance:

  • All devices that are lost or stolen should be reported to IT within 24 hours, and the mobile carrier should be notified immediately.
  • Any employee who uses their mobile device does so knowing that it signifies their consent to the acceptable use policy, and their intention to abide by it.
  • Any mobile device may be disconnected from the company network or have its access to services revoked without notice.
  • While IT will make their best efforts to preserve a user’s data, any device that needs to be remotely wiped for security purposes will be wiped to protect the company. This means the user is responsible for maintaining their own backups.

Acceptable Device Use

Finally, you need to make sure you include a section in your guidelines that dictate how these devices can be used in the office (or out of it, for that matter) to conduct work tasks. Some will be based on your personal preferences, while others are more related, again, to your security. A few sample policies that your overall mobile device policy should include are:

  • Designated guidelines clarifying the differences between business and personal use of devices, and what is acceptable for either on company time - and what is not allowed at any time, like storing illegal materials or conducting harassment.
  • A comprehensive list of business materials and resources that an employee can access with a mobile device.
  • All approved applications that may be downloaded, as well as those that may not be, such as those not acquired through Google Play or the App Store.
  • Websites that may not be accessed via the business' network.

Interested in learning about a mobile device policy, and what it needs to contain, in more detail? Reach out to us! Our professionals can walk you through each point in detail, assisting you in creating and enforcing protections for your company that work. Give us a call at 020 8626 4485.

VoIP’s Benefits are Numerous
Who Fixes Broken Technology with Managed Services?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 27 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Network Security Technology Business Computing Tip of the Week Best Practices Cloud Managed IT Services Hosted Solutions Privacy Disaster Recovery Malware Data Recovery communications Hackers Data Backup Outsourced IT Backup Data Business Productivity Innovation Cloud Computing IT Services Productivity Email IT Support Software Cybersecurity VoIP Mobile Devices Business Continuity Computer Small Business Saving Money Internet of Things Internet Upgrade Business Management IT Support Microsoft Efficiency Managed IT services Managed IT Automation Information Technology BDR Phishing Mobile Device Management Smartphone Hardware Server Mobility Collaboration Artificial Intelligence Avoiding Downtime Save Money Risk Management Budget Windows 7 BYOD Hosted Solution Password Firewall Virtual Private Network Remote Computing Spam Network Data Management Ransomware User Tips Managed Service Provider History Compliance Cost Management Quick Tips Communication Computers Printing Conferencing Android Workplace Tips Solid State Drive Value MSP Document Management Content Filtering Smartphones Saving Time Personal Information Remote Workers Data Breach IT Service Data Security Redundancy Managed Service Tech Term Windows 10 Passwords Networking Hybrid Cloud Telephone Systems Router Audit Recovery Business Technology Automobile Gadgets Devices Hard Drives Paperless Office Manufacturing e-waste Fiber Optics Wasting Money Operating System Project Management Azure Facebook VPN Remote Monitoring The Internet of Things Human Resources Software as a Service Spyware Education Cleaning Mobile Office Streaming Media Transportation Holiday Backup and Disaster Recovery Advertising Google Computer Repair File Storage Microsoft Office IoT Work/Life Balance Employer-Employee Relationship Cybersecurty Wireless Internet Phone System Windows Server 2008 Computing Amazon Proactive IT Private Cloud Hacking SMB Active Directory Commerce Social Media Update Break/Fix Window 10 Payroll Apple Mobile Computing Applications Application Development Content Filter Upgrades Legal Going Green Entertainment Samsung Instant Messaging Disaster Bandwidth Business Intelligence Office 365 Downtime Gamification Evernote Employees Analysis Virtual Assistant intranet Save Time Smart Technology Windows Server Administration Online Storage Dark Web User Error Two-factor Authentication Help Desk Monitoring Wireless Technology HIPAA Training Word Encryption Electronic Medical Records Chromebook App E-Commerce Colocation Mobile Browser Virtualization Copiers Alexa for Business Government Customer Relationship Management Data Loss Management Printers Money Utility Computing Regulation Black Market Smart Tech SaaS Vendor Managed IT Service Social Engineering Telephony Payment Cards Students Vulnerability Hacker Professional Services Marketing Workers Shadow IT Big Data Voiceover Internet Protocol Mobile Device OneNote Machine Learning Voice over Internet Protocol Nanotechnology Financial Technology Data Protection End of Support Flexibility Unified Communications Connectivity Employee-Employer Relationship iPhone Proactive Antivirus Windows 10 Travel Cybercrime Business Telephone WPA3 Meetings Lifestyle Root Cause Analysis Microsoft Excel Display IT Management Adobe Users Scalability Wireless Charging Experience Facebook Privacy Office Tips Unified Threat Management Testing Screen Mirroring Health Websites Tablets Microsoft Word Virtual Reality Smartwatch Data Privacy Settings Legislation Windows 10s Peripheral Outlook YouTube Augmented Reality HaaS File Sharing Google Assistant Co-Managed Services Internet Exlporer WannaCry Financial Computer Fan Tech Support Worker Camera Cast Windows Gifts Data Theft NFL Maintenance Google Drive Server Maintenance Inventory Hard Drive Business Strategy Social Comparison Language Myths Hard Disk Drive Access Control Shortcut Humor Chrome Music Holidays Storage Twitter Telephone Licensing 5G Bring Your Own Device Fraud Alert Battery Consultant Projects Search PDF Best Practice eWaste Investment Communitications Wireless Specifications Wi-Fi Computer Accessories Threats Memory Admin Excel How To Analytics OneDrive App store Television CrashOverride Sports IT budget Security Cameras Processor Computer Forensics Emails Hyperlink IT Solutions Medical IT Computer Care Edge Point of Sale Micrsosoft HBO Credit Cards Robot Company Culture Apps Windows Ink Device Security Safety ROI Hosted Desktop Relocation Sales Virus Scams Current Events Sabotage Mobile Security Information Law Enforcement Cortana Blockchain Identity Theft Office Benchmarks Gmail Webinar Wasting Time WIndows Server 2008 eCommerce Unsupported Software Google Docs Ciminal Digital Signage Touchscreen FAQ Politics Charger iOS Keyboard Shortcuts Sync Text Messaging Google Maps Miscellaneous Managing Stress Emergency Windows Server 2008 R2 Smart Devices WiFi Data Storage Video Games Retail Vendor Management Employee Managed Services Provider Updates USB Books PC Identity Reputation Identities Worker Commute Scam PowerPoint IT solutions Accessory Patch Management