Mobile Policy

Masters
Assignment
Technology
Pages 11 (2761 words)
Download 0
This is a mobile security policy outlining the proper use of company mobile phones. This policy covers how to handle the company phones safely and minimize risks of threats. This policy pertains to both the Windows Mobile and Blackberry Smart Phones. Along with explaining the risks of the threats that exist for mobile smart phones, this policy also outlines how such threats can be minimized, so the mobile phones can remain protected.

Introduction

The company mobile phones that will be supplied are Windows mobile Smart Phones and Blackberries. You have the choice to decide which you will use. When a phone is issued to you that is the phone that you will keep. When leaving at the end of the day, you will return the phone to your locker and use it again when you return to work the following day.
Company Security. While mobile smart phones are an innovative tool, we must remember that they can be hacked because they are designed similar to computers (Svensson). Because of this, confidential company information, such as account numbers and the like, is not to be shared on these phones via data usage. It is perfectly fine to give such information over the phone, as it may become necessary; however, sending and receiving it via data is strictly prohibited.
Personal Use of Company Mobile Phones. Company mobile phones are not to be used for personal use in any way, shape, or form. They are for company communications only. We mandate this to keep the risks of infected software, such as virus and spyware finding their way onto the phone, via text message and downloads, to a minimum. ...
Download paper
Not exactly what you need?

Related papers

Mobile IP
The route does not have to be the same in both directions. Therefore, a mobile host needs to have a stable IP address in order to be uniquely identifiable to other Internet hosts. However, when a mobile host moves from one network to another, as shown in Fig. 1, the IP address of an MH will change due to the enforced hierarchical address structure of the Internet. If the MH has only standard IP…
The Mobile Phone Industry in the UK
This is an example of technological change or technological innovation.…
Mobile Computing Assignment
The design requirement I- e devices needed to construct the network will follow this. The issues like how will user connect to the network will be address in this part.…
Mobile Phone Radiations
But several studies on workers and experts who live within proximity of active radio frequency transmitters and even the modern mobile phone base stations have not shown increased probability of them having radiation related complications.…
Mobile Policy
The company mobile phones that will be supplied are Windows mobile Smart Phones and Blackberries. You have the choice to decide which you will use. When a phone is issued to you that is the phone that you will keep. When leaving at the end of the day, you will return the phone to your locker and use it again when you return to work the following day.…
Power Control for Mobile Phones
There are three main bodies of work addressing this concern, firstly, the user can be assigned a fixed base station, secondly, the user can be iteratively assigned to the base station which has the maximum signal to interference ratio and thirdly, a user's signal is a combination of signals from various base stations.…
Mobile Computing
As a key component of Intelligent Transportation Systems Inter Vehicle Communication (IVC) is one of the major applications of mobile computing. A large amount of research has been carried out by academia and the industry alike in this field. IVC enables each and every high speed automobile to send, receive and forward packets amongst each other by dynamically forming mobile ad-hoc networks…