Mobile Policy - Assignment Example

Only on StudentShare

Extract of sample
Mobile Policy

The company mobile phones that will be supplied are Windows mobile Smart Phones and Blackberries. You have the choice to decide which you will use. When a phone is issued to you that is the phone that you will keep. When leaving at the end of the day, you will return the phone to your locker and use it again when you return to work the following day.
Company Security. While mobile smart phones are an innovative tool, we must remember that they can be hacked because they are designed similar to computers (Svensson). Because of this, confidential company information, such as account numbers and the like, is not to be shared on these phones via data usage. It is perfectly fine to give such information over the phone, as it may become necessary; however, sending and receiving it via data is strictly prohibited.
Personal Use of Company Mobile Phones. Company mobile phones are not to be used for personal use in any way, shape, or form. They are for company communications only. We mandate this to keep the risks of infected software, such as virus and spyware finding their way onto the phone, via text message and downloads, to a minimum. ...
Download paper

Summary

This is a mobile security policy outlining the proper use of company mobile phones. This policy covers how to handle the company phones safely and minimize risks of threats. This policy pertains to both the Windows Mobile and Blackberry Smart Phones. Along with explaining the risks of the threats that exist for mobile smart phones, this policy also outlines how such threats can be minimized, so the mobile phones can remain protected.
Author : xleuschke

Related Essays

Mobile IP
The route does not have to be the same in both directions. Therefore, a mobile host needs to have a stable IP address in order to be uniquely identifiable to other Internet hosts. However, when a mobile host moves from one network to another, as shown in Fig. 1, the IP address of an MH will change due to the enforced hierarchical address structure of the Internet. If the MH has only standard IP stack in its operating system, the TCP connection will break up following this movement. (Mondal, 2003)
...
8 pages (2008 words) Essay
Umts and Mobile Computing
Mobility and mobile computing is playing an increasing role in human-computer interaction research and design as a result of the ever growing range of technology now supporting mobility. Mobile computers, laptops, tablet PCs, PDAs, cellular phones, and hybrids are all devices intended to support mobility of users, and the proliferation of wireless network access like WLAN, UMTS, GPRS, and GMS all support mobile computing. Effective resource management and reliable equipment are essential for optimum performance in any organization. Both depend upon accurate, timely management of massive...
11 pages (2761 words) Essay
Mobile Computing Assignment
The design requirement I- e devices needed to construct the network will follow this. The issues like how will user connect to the network will be address in this part.
...
20 pages (5020 words) Assignment
Mobile Phone Radiations
But several studies on workers and experts who live within proximity of active radio frequency transmitters and even the modern mobile phone base stations have not shown increased probability of them having radiation related complications.
...
10 pages (2510 words) Research Paper
Power Control for Mobile Phones
The aim of the minimum power assignment method is to provide users of cellular communication services with an acceptable connection with minimum usage of power on the side of the user so as to elongate battery discharge time, i.e. the amount of time that it takes for the battery of the cellular device to get discharged. The use of the synchronous and asynchronous standard power control algorithms guarantee to find the minimal power level required for establishing an acceptable connection given that the interference from other users that needs to be over come to do so, characterized by the...
8 pages (2008 words) Essay
Mobile Computing
As a key component of Intelligent Transportation Systems Inter Vehicle Communication (IVC) is one of the major applications of mobile computing. A large amount of research has been carried out by academia and the industry alike in this field. IVC enables each and every high speed automobile to send, receive and forward packets amongst each other by dynamically forming mobile ad-hoc networks (MANETS). The information is transferred, distributed and acquired over this network. The vehicle to vehicle communication (V2V) enables the drivers and their vehicles to communicate with other vehicles...
10 pages (2510 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!