0% found this document useful (0 votes)
67 views6 pages

Mobile Device Management Policy

This document provides a template for a mobile device management policy with sections for background information, scope, acceptable use, security requirements and support, risk management, and definitions. The template outlines the key components that should be included in each section, such as defining acceptable and prohibited uses of devices, security measures, and support offerings from an organization's IT department. It is intended to provide organizations with guidelines for creating a comprehensive policy to safely manage the use of mobile devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views6 pages

Mobile Device Management Policy

This document provides a template for a mobile device management policy with sections for background information, scope, acceptable use, security requirements and support, risk management, and definitions. The template outlines the key components that should be included in each section, such as defining acceptable and prohibited uses of devices, security measures, and support offerings from an organization's IT department. It is intended to provide organizations with guidelines for creating a comprehensive policy to safely manage the use of mobile devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

MOBILE DEVICE MANAGEMENT

POLICY TEMPLATE
VERSION HISTORY

MOBILE DEVICE
REVISION
VERSION APPROVED BY DATE DESCRIPTION OF CHANGE AUTHOR

MANAGEMENT
POLICY
COMPANY NAME
PREPARED TITL
DATE
Street
BY Address E
APPROVED TITL
City,
BY State and Zip E
DATE

[Link] TABLE OF CONTENTS

VERSION 0.0.0 1...................BACKGROUND

..................................................3
00/00/0000
2..................................SCOPE

..................................................3

3. ACCEPTABLE USE.........................................................................................................................................4

4. MOBILE DEVICE SECURITY REQUIREMENTS AND SUPPORT............................................................4

5. RISK MANAGEMENT....................................................................................................................................4

6. DEFINITIONS..................................................................................................................................................4
1. BACKGROUND
This section gives the foundation for your organization's mobile device management policy, explaining why your organization created it and detailing
practices and requirements for the safe use of mobile devices in an effort to protect the company’s infrastructure.
It will also provide the objectives your organization intends to achieve by creating and implementing the policy.

2. SCOPE
This section details everything that your policy covers, including all mobile devices that are company or employee owned.
3. ACCEPTABLE USE
This section is the guts of your policy. Here, you should outline the activities that fall under acceptable use and include the following.
• The company’s definition of acceptable use
• Blocked websites
• Camera and video usage
• Prohibited use of device
• Permitted apps
• Prohibited apps
• Company resource accessibility
4. MOBILE DEVICE SECURITY REQUIREMENTS AND SUPPORT
This section outlines any device requirements and company support offerings.
• Operating system requirements
• Password requirements
• Patch and upgrade requirements
• What does the organization’s IT department support?
• Does the company configure employee mobile devices? If so, are there specific features, apps supported?
• Will MDM software be used to manage and support devices? If so, what will the MDM software do?

5. RISK MANAGEMENT
This section includes the rights of the company in case of a lost/stolen device or employee termination. The ability to wipe a device, reporting
procedures, and ethical usage may be included here.
6. DEFINITIONS
This section provides definitions of information technology and other terms that might be confusing to a lay reader. Those definitions must be written
using simple, easy-to-understand language.

TERM DEFINITION
DISCLAIMER

Any articles, templates, or information provided by Smartsheet on the website are for reference only. While we strive to
keep the information up to date and correct, we make no representations or warranties of any kind, express or implied,
about the completeness, accuracy, reliability, suitability, or availability with respect to the website or the information,
articles, templates, or related graphics contained on the website. Any reliance you place on such information is
therefore strictly at your own risk.

You might also like