Corporate Mobility Policy
| #CSOL
The scope of this policy applies to all employees, including part-time and contract employees who wish to use their own devices to access the company’s network, applications, and services.
Acceptable Use
- Employees are allowed to use their mobile devices to access the company resources through mobile application management (MAM) tool to install company-approved apps such as email, calendar, contacts, and cloud drive.
- Only corporate owned or managed mobile computing devices are authorized to access the company information.
- Lost or stolen devices must be reported immediately to the company. Employees are responsible for notifying their mobile carrier upon the loss of a device.
- The company has a zero-tolerance policy for storing or transmitting illicit materials.
- If the employee opts for company-provided device, the employee is not allowed to installany personal apps (Berry, n.d.).
Mobile Devices and Support
- The IT department will support BYOD devices for configuration and troubleshooting of network connectivity to company resources. Any hardware and operating system issues must be directed to the device manufacturer.
- The IT department will install a mobile application management (MAM) tool on all BYOD devices. The MAM tool will allow IT to control and secure the company-specific applications, while everything else on the phone is untouched (Madden, 2012).
- The company supports devices that run Google Android 9.0 and later, and Apple iOS 12.4 and later.
Security
- Mobile devices must be password protected using the features of the device to prevent unauthorized access.
- Passwords must contain a minimum of 15 characters or an 8-digit pin code. You can also use the touch id or face id to unlock the device.
- The mobile device must lock itself with a password or PIN if it is idle for five minutes.
- Jailbroken or Rooted mobile devices are strictly prohibited from accessing the companynetwork.
- Unapproved apps are prohibited from installing on company issued mobile device.
- The MAM tool provides the company the ability to secure the data on the device. It willnot a!ect the employee’s other apps. It supports the remote wipe functionality by just wiping the company apps and data while leaving the employee personal apps alone (Madden, 2012).
Reimbursement
Employees are solely responsible for the cost of their mobile devices. The company is not responsible for any expenses incurred from the use of any mobile devices including service plans, fees, and taxes. The employee is free to choose any mobile device as long as the company supports the device.
Alternative Mobile Device Option
If the employee does not want to use their mobile device, they can opt for a company- provided device. An employee has the option to choose a mobile device from a provided list. The employee pays the cost of the mobile device and the company pays the monthly service plan. The mobile device comes with mobile device management (MDM) software pre-installed to support remote management of the device, such as installing company-approved apps. It also provides the capability of a remote wipe of the device in case the device is lost or stolen. No personal apps or data is allowed.
References
- Berry, M. (n.d.). BYOD Policy Template. Retrieved From. http://www.itmanagerdaily.com/byod-policy-template/
- Madden, B. (2012, May 29). What is MDM, MAM, and MIM? (And what’s the di!erence?). Retrieved From. https://www.brianmadden.com/opinion/What-is- MDM-MAM-and-MIM-And-whats-the-di!erence