Mobile Policy - Assignment Example

Only on StudentShare

Extract of sample
Mobile Policy

The company mobile phones that will be supplied are Windows mobile Smart Phones and Blackberries. You have the choice to decide which you will use. When a phone is issued to you that is the phone that you will keep. When leaving at the end of the day, you will return the phone to your locker and use it again when you return to work the following day.
Company Security. While mobile smart phones are an innovative tool, we must remember that they can be hacked because they are designed similar to computers (Svensson). Because of this, confidential company information, such as account numbers and the like, is not to be shared on these phones via data usage. It is perfectly fine to give such information over the phone, as it may become necessary; however, sending and receiving it via data is strictly prohibited.
Personal Use of Company Mobile Phones. Company mobile phones are not to be used for personal use in any way, shape, or form. They are for company communications only. We mandate this to keep the risks of infected software, such as virus and spyware finding their way onto the phone, via text message and downloads, to a minimum. ...Show more

Summary

This is a mobile security policy outlining the proper use of company mobile phones. This policy covers how to handle the company phones safely and minimize risks of threats. This policy pertains to both the Windows Mobile and Blackberry Smart Phones. Along with explaining the risks of the threats that exist for mobile smart phones, this policy also outlines how such threats can be minimized, so the mobile phones can remain protected.
Author : xleuschke
Save Your Time for More Important Things
Let us write or edit the assignment on your topic
"Mobile Policy"
with a personal 20% discount.
Grab the best paper

Related Essays

Mobile IP
Popular transport protocols, such as TCP (Allman et al., 1999), keep track of their internal session state between the communicating endpoints by using the IP address of the two endpoints and their port numbers. On the other hand, IP addresses are also used to find a route between the endpoints.
8 pages (2000 words) Essay
Umts and Mobile Computing
The paper describes how these requirements were realized in an architecture for local mobility, and how the architecture can be implemented in the health care domain and the costs involved in it and the various benefits gained from it.
11 pages (2750 words) Essay
Prototyping
As a result, they should be highly motivated to participate in an IS prototype development process. Prototyping in Information Systems provides a bridge to users with the designers of the project. This helps software development team in understanding and developing the design as per the user need and provides users a sneak preview of the way the software package may shape up.
9 pages (2250 words) Essay
Mobile Computing Assignment
Apart from the cost analysis the report will include all the technical requirements of the system, usage and security requirement of the systems. The design part will contain a cellular map design showing a cellular network and topology design showing the wireless part of the network.
20 pages (5000 words) Assignment
Mobile Phone Radiations
Rate of absorption of the electromagnetic radiation and the duration of the exposure to the radiation is being investigated while earlier research indicates that problems in human brain and head health have a huge possibility of basing their source as these radiations.
10 pages (2500 words) Research Paper
Power Control for Mobile Phones
As the number of cellular subscribers increases exponentially, there are several issues that have to be addressed to ensure effective and efficient usage of this technology while providing the users with a satisfying communication experience
8 pages (2000 words) Essay
DATABASE MANAGEMENT SYSTEMS Essay
Though both the technologies have their own advantages, disadvantages and interoperability, there are some instances where one is proffered more than the other. Hence the current study makes an insight into the minute details of the relation between XML and RDBMS to understand their true nature of complimentary and controversy.
14 pages (3500 words) Essay
Track design for linespeed improvements
In diverging routes, continuities create a need for speed restrictions. In obtaining a higher diverging speed, it is necessary to completely replace an existing turnout with a new one. However, new designs are more costly. The main purpose of the study is to redesign a curve of transition between a curve and a straight track.
13 pages (3250 words) Research Paper
Mobile Computing
The later sections will deal with a survey on the computers present in the vehicles and their user interfaces. The advances in mobile computing and communication technology have made it possible today to equip each and every vehicle with equipment that has high computing and communication capability.
10 pages (2500 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT