Personal Mobile Device Acceptable Use Policy Overview

undefined
1
Personal 
Mobile Device Acceptable Use 
Policy
Training
 
Slideshow
DriveStrike – The Smart Choice
Instructions 
for 
Using 
This
 
Template
Replace 
[company] with your 
company’s 
name
, and other
company-specific information 
in 
[square  brackets].
Ensure that all policies are applicable to your 
company’s
 
goals.
Review 
[optional] 
items 
and delete if they 
do
 not
 
apply
.
Replace 
the 
footer 
with your
 
own.
Delete this
 
slide.
 
2
DriveStrike – The Smart Choice
What are 
Personal 
Mobile
 
Devices?
Primarily 
smart phones, but 
also
 
include:
Ultra-mobile/netbook
 
computers.
Personal 
laptop
 
computers
.
Portable 
gaming
 
devices.
Portable media
 
devices.
Tablet
 
computers.
e-Readers.
Any 
personally-owned device storing corporate data and/or  connecting
to 
[
company
]’s 
network 
is 
bound by the 
acceptable 
use  policy.
3
DriveStrike – The Smart Choice
Purpose
4
Permitting
 
you to 
use
 your own devices to work  
is
mutually 
beneficial, allowing  
you to be accessible 
and
productive on 
a 
device  you are 
already 
familiar
 
with.
However, 
personal devices introduce
 potential  risks to
the integrity of private 
information and  
business data
that 
is 
made 
available 
when  
connected 
with
[company]’s
 
data and 
technology.
Th
e
 acceptable 
use policy 
is 
necessary
 
to
mitigate 
the
 
risk.
By 
connecting
 
a 
personal 
device 
to 
[company]’s
network, you agree 
to 
comply 
with 
the policy  explained
here, 
and 
grant 
[company] 
permission  to erase the
information 
on your device 
when
  
necessary.
 This may
include erasing personal data in some cases.
DriveStrike – The Smart Choice
Case Study: 
John
 at the 
Beach
I
n
cident
John 
is at 
the beach 
with
his  family when he
receives
 
a  
sensitive e-
mail 
from a  
coworker
 on
his personal  iPhone.
John quickly responds to
the email and
 continues
with his day at 
the
 
beach
.
Later that day
, 
John
realizes 
he 
forgot his
iPhone on 
the counter
at a
 
food 
stand
 at 
the
beach
.
Action
R
ealizing he has lost  his
phone, J
ohn 
immediately
calls his  manager and 
the
IT  
contact 
responsible for
managing mobile
 
devices.
IT 
is able 
to 
remote wipe
the 
iP
hone immediately,
mitigating
 
data  leakage
risk 
and 
the 
effect it  may
have on 
the  
company.
J
ohn
s
 quick action
ensure
d
 sensitive  data
was 
protected 
from
access
 by an
unintended
 
party.
The 
net effect in real
dollar terms 
to the
company is 
$0 
outside
 
of
the 
cost 
to 
set 
up the
initial
 
infrastructure.
John
 buys 
a 
new iPhone
and loads 
a 
backup
image  
of his previous
device  onto 
it,
minimizing 
the  
time
required 
to 
return
 
to
productivity.
Effect 
on
[Company]
 
Quick 
action 
by 
employees 
that have lost devices 
is 
the 
most 
effective 
way
to 
mitigate 
security threats from personal 
mobile 
devices. 
The faster
[company] can remote wipe the device, the
 
better.
5
DriveStrike – The Smart Choice
6
Responsibilities
You, 
as an 
employee of [company], are responsible for
 
acting
in accordance 
with company policies 
and
 procedures.
Connections between mobile 
devices 
and 
the corporate
network 
will 
be 
managed by 
[company]’s 
IT
 
department.
[Company]’s IT 
department will 
not 
directly 
manage 
the
functionality 
or performance of devices except 
in 
their
capacity to connect to 
the 
corporate
 
network.
Users are expected 
to 
adhere 
to 
the same security
 
standards
no matter 
where the device 
is
 
used.
DriveStrike – The Smart Choice
Policies:
 
Access
Mobile 
devices 
must 
be used appropriately, responsibly, 
and
ethically. 
In most 
circumstances, these goals can be 
reached 
by
following the policies laid out
 
here.
 
Mobile 
devices 
must 
be approved 
by 
IT before 
being
connected  
to the corporate
 
network.
If 
necessary, devices 
must 
be 
modified 
or set up to
 
meet
[company]’s 
security
 
standards.
Virtual 
Private 
Network 
(VPN) 
software 
must be 
used
 
when
accessing the corporate network from outside the
 
workplace.
7
DriveStrike – The Smart Choice
Policies:
 
Security
Do
 
 
Devices must 
be encrypted with 
a 
strong
 
password.
A PIN 
code 
is not
 
sufficient.
Use reasonable physical security
 
measures.
Do not 
leave 
your 
device
 
unattended.
Use 
anti-virus / 
anti-malware
 
software.
If a mobile 
device connects 
to a 
computer, 
have anti-virus on 
the
 
computer.
8
Store Crypto Keys
 In Separate Location
Never store USB crypto keys with the device it unlocks
.
DriveStrike – The Smart Choice
Policies:
 
Security
Do
 
Not
Do not 
store 
unencrypted
 
passwords.
For example, 
by 
e-mailing a 
password 
or 
storing 
it in a 
text
 
file.
Do not 
try to bypass security measures from IT.
Leave additional 
software 
in
 
place.
Do not leave 
company 
data 
on your device
 
indefinitely.
If 
you 
stop using 
the device 
or 
end 
your 
employment, erase company
 
data.
Do not 
use location-based
 
services.
Sharing 
your 
location with third-parties 
is not
 
allowed.
Do not 
use your device to capture
 
media.
Avoid 
pictures, 
video, or audio on 
company
 
property.
9
DriveStrike – The Smart Choice
Policies:
 
Support
 
 
[Company] 
will provide limited support for 
sanctioned
 
devices.
Supported: 
can’t 
access corporate 
e-mail, 
calendar,
 
collaboration.
Not 
supported: 
phone 
won’t 
turn 
on, 
screen 
is 
cracked, 
no
 
service.
IT 
may limit
 
access.
Your ability to transfer data to and 
from 
specific 
resources 
on 
the
 
corporate
network may 
be reduced 
at any
 
time.
10
DriveStrike – The Smart Choice
Policies: 
Organizational
 
Protocol
 
 
Your activity will 
be monitored while on 
the company
 
network.
For example, 
dates, times, 
and 
duration 
of
 
access.
[Company] [will / will not] 
reimburse the cost 
of
 
devices.
[Policy and maximum amount of 
hardware
 
reimbursement].
[Company] [will / will not] 
reimburse the cost 
of
 
services.
[Policy and maximum monthly amount of 
data 
and voice usage
reimbursement].
11
DriveStrike – The Smart Choice
Inciden
t
s
 
Incidents involving 
devices that contain corporate data 
such as 
a
lost or stolen device, or suspicion of 
unauthorized access – must 
be
immediately 
reported 
to your 
manager and 
the 
IT
 
department.
12
DriveStrike – The Smart Choice
Policy 
Enforcement
 
Technology
Remote
 
Wipe
Encryption
Third 
Party
 
Software
By 
connecting to [company]’s network 
and taking 
the
necessary security measure, you agree to grant IT the
ability 
to 
erase all 
data on the device, 
if it is 
necessary to
do so 
to 
preserve [company]’s security 
and
 
integrity.
Data 
on the device 
and 
data transferred to 
and 
from
[company]’s network must be 
encrypted. 
Contact the
IT department to ensure that the required level of data
encryption is
 
present.
[Insert 
details if 3
rd 
party software 
is 
used for 
mobile
 
device
management and
 
enforcement.]
13
DriveStrike – The Smart Choice
Consequences 
of
 
Non-Compliance
The [
Responsible Title
] 
will 
be advised 
of  
breaches in
the policy 
and 
is
 
responsible for 
remediation
.
Failing to comply with these policies 
and 
procedures
may result in one 
or 
more 
of the
 
following:
Suspension of
technology use
at 
the
 
company.
14
Loss 
of
con
n
e
ction
privileges.
Discipli
n
ary
action.
Termination
 
of
employment.
DriveStrike – The Smart Choice
Questions?
A 
copy of the 
Personal 
Mobile 
Device Acceptable 
Use 
Policy
, 
reviewed 
here, 
must 
be signed before 
connecting any
personal 
devices 
to 
the 
corporate
 
network.
The 
Remote Wipe Waiver
 
must also 
be signed before
connecting personal
 
devices.
This 
policy 
is available 
for future reference 
at
 
[location].
Questions or 
comments about 
the policy should be directed
to 
[name, 
phone 
number,
 
e-mail].
DriveStrike – The Smart Choice
15
Slide Note
Embed
Share

The training slideshow provides an overview of the acceptable use policy for personal mobile devices in the workplace. It covers the definition of personal mobile devices, the purpose of the policy, a case study illustrating its importance, and employee responsibilities. The policy aims to balance productivity with data security by outlining guidelines for using personal devices connected to the company's network.

  • Mobile Device Policy
  • Data Security
  • Acceptable Use
  • Workplace Technology
  • Employee Responsibilities

Uploaded on Sep 13, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Personal Mobile Device Acceptable Use Policy Training Slideshow 1 DriveStrike The Smart Choice

  2. Instructions for Using This Template Replace [company] with your company s name, and other company-specific information in [square brackets]. Ensure that all policies are applicable to your company s goals. Review [optional] items and delete if they do notapply. Replace the footer with your own. Delete this slide. 2 DriveStrike The Smart Choice

  3. What are Personal Mobile Devices? Primarily smart phones, but also include: Ultra-mobile/netbook computers. Personal laptop computers. Portable gaming devices. Portable media devices. Tablet computers. e-Readers. Any personally-owned device storing corporate data and/or connecting to [company] s network is bound by the acceptable use policy. 3 DriveStrike The Smart Choice

  4. Purpose Permitting you to use your own devices to work is mutually beneficial, allowing you to be accessible and productive on a device you are already familiar with. However, personal devices introduce potential risks to the integrity of private information and business data that is made available when connected with [company] s data and technology. The acceptable use policy is necessary to mitigate the risk. By connecting a personal device to [company] s network, you agree to comply with the policy explained here, and grant [company] permission to erase the information on your device when necessary. This may include erasing personal data in some cases. 4 DriveStrike The Smart Choice

  5. Case Study: John at the Beach Effect on [Company] Incident Action Realizing he has lost his phone, John immediately calls his manager and the IT contact responsible for managing mobile devices. IT is able to remote wipe the iPhone immediately, mitigating data leakage risk and the effect it may have on the company. John is at the beach with his family when he receivesa sensitive e- mail from a coworker on his personal iPhone. John quickly responds to the email and continues with his day at thebeach. Later that day, John realizes he forgot his iPhone on the counter at a food stand at the beach. John s quick action ensured sensitive data was protected from access by an unintended party. The net effect in real dollar terms to the company is $0 outsideof the cost to set up the initial infrastructure. John buys a new iPhone and loads a backup image of his previous device onto it, minimizing the time required to returnto productivity. Quick action by employees that have lost devices is the most effective way to mitigate security threats from personal mobile devices. The faster [company] can remote wipe the device, the better. 5 DriveStrike The Smart Choice

  6. Responsibilities You, as an employee of [company], are responsible for acting in accordance with company policies and procedures. Connections between mobile devices and the corporate network will be managed by [company] s IT department. [Company] s IT department will not directly manage the functionality or performance of devices except in their capacity to connect to the corporate network. Users are expected to adhere to the same security standards no matter where the device is used. 6 DriveStrike The Smart Choice

  7. Policies:Access Mobile devices must be used appropriately, responsibly, and ethically. In most circumstances, these goals can be reached by following the policies laid out here. Mobile devices must be approved by IT before being connected to the corporate network. If necessary, devices must be modified or set up to meet [company] s security standards. Virtual Private Network (VPN) software must be used when accessing the corporate network from outside the workplace. 7 DriveStrike The Smart Choice

  8. Policies: Security Do Devices must be encrypted with a strongpassword. A PIN code is not sufficient. Use reasonable physical security measures. Do not leave your device unattended. Use anti-virus / anti-malware software. If a mobile device connects to a computer, have anti-virus on the computer. Store Crypto Keys In Separate Location Never store USB crypto keys with the device it unlocks. 8 DriveStrike The Smart Choice

  9. Policies: Security Do Not Do not store unencrypted passwords. For example, by e-mailing a password or storing it in a text file. Do not try to bypass security measures from IT. Leave additional software in place. Do not leave company data on your device indefinitely. If you stop using the device or end your employment, erase company data. Do not use location-based services. Sharing your location with third-parties is not allowed. Do not use your device to capture media. Avoid pictures, video, or audio on company property. 9 DriveStrike The Smart Choice

  10. Policies: Support [Company] will provide limited support for sanctioned devices. Supported: can t access corporate e-mail, calendar, collaboration. Not supported: phone won t turn on, screen is cracked, no service. IT may limit access. Your ability to transfer data to and from specific resources on the corporate network may be reduced at any time. 10 DriveStrike The Smart Choice

  11. Policies: Organizational Protocol Your activity will be monitored while on the company network. For example, dates, times, and duration of access. [Company] [will / will not] reimburse the cost of devices. [Policy and maximum amount of hardware reimbursement]. [Company] [will / will not] reimburse the cost of services. [Policy and maximum monthly amount of data and voice usage reimbursement]. 11 DriveStrike The Smart Choice

  12. Incidents Incidents involving devices that contain corporate data such as a lost or stolen device, or suspicion of unauthorized access must be immediately reported to your manager and the IT department. 12 DriveStrike The Smart Choice

  13. Policy Enforcement Technology RemoteWipe By connecting to [company] s network and taking the necessary security measure, you agree to grant IT the ability to erase all data on the device, if it is necessary to do so to preserve [company] s security and integrity. Encryption Data on the device and data transferred to and from [company] s network must be encrypted. Contact the IT department to ensure that the required level of data encryption is present. Third PartySoftware [Insert details if 3rd party software is used for mobiledevice management and enforcement.] 13 DriveStrike The Smart Choice

  14. Consequences of Non-Compliance The [Responsible Title] will be advised of breaches in the policy and is responsible for remediation. Failing to comply with these policies and procedures may result in one or more of the following: Suspension of technology use at the company. Loss of connection privileges. Disciplinary action. Termination of employment. 14 DriveStrike The Smart Choice

  15. Questions? A copy of the Personal Mobile Device Acceptable Use Policy, reviewed here, must be signed before connecting any personal devices to the corporate network. The Remote Wipe Waiver must also be signed before connecting personal devices. This policy is available for future reference at [location]. Questions or comments about the policy should be directed to [name, phone number, e-mail]. 15 DriveStrike The Smart Choice

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#