StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Policy for Mobile Phone Use - Assignment Example

Cite this document
Summary
The paper "Policy for Mobile Phone Use" will begin with the statement that the policy for mobile phone use at Smith Kendon is a mobile security policy outlining the proper use of company mobile phones. This policy covers how to handle company phones safely and minimize risks of threats…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Policy for Mobile Phone Use
Read Text Preview

Extract of sample "Policy for Mobile Phone Use"

Policy for Mobile Phone Use at Smith Kendon This is a mobile security policy outlining the proper use of company mobile phones. This policy covers how to handle the company phones safely and minimize risks of threats. This policy pertains to both the Windows Mobile and Blackberry Smart Phones. Along with explaining the risks of the threats that exist for mobile smart phones, this policy also outlines how such threats can be minimized, so the mobile phones can remain protected. Company Mobile Phones. These company mobile phones are designed for the convenience of employees to access necessary information, such as prices and product information, quickly and easily. These phones are not to be taken off the premises; they are to remain on company property at all times, unless you are given authorization to do otherwise. The company mobile phones that will be supplied are Windows mobile Smart Phones and Blackberries. You have the choice to decide which you will use. When a phone is issued to you that is the phone that you will keep. When leaving at the end of the day, you will return the phone to your locker and use it again when you return to work the following day. Company Security. While mobile smart phones are an innovative tool, we must remember that they can be hacked because they are designed similar to computers (Svensson). Because of this, confidential company information, such as account numbers and the like, is not to be shared on these phones via data usage. It is perfectly fine to give such information over the phone, as it may become necessary; however, sending and receiving it via data is strictly prohibited. Personal Use of Company Mobile Phones. Company mobile phones are not to be used for personal use in any way, shape, or form. They are for company communications only. We mandate this to keep the risks of infected software, such as virus and spyware finding their way onto the phone, via text message and downloads, to a minimum. The following is considered to be personal use of the mobile devices: Calling friends or making other personal calls outside of company communications. Downloading pictures, music, ring tones, software, and other media. Taking pictures or using the camcorders. Sending text messages other than for company communications. Surfing the Internet. Going on social network sites. Loading pictures and software onto the phone via an SD card or other storage device. If you wish to engage in personal use of a phone on the job, you may use your own mobile device on breaks and during lunch. You are not to deal with anything personal while on the clock. Furthermore, we are not responsible for the protection or security of your personal mobile devices. You use them at your own risk. Security Measures that are to be taken. Aside from observing the rules about personal usage, it is important that all of the security measures are strictly followed. If these security measures are not adhered to, then the mobile phones will be at risk. The security measures that are to be adhered to in regards to the mobile smart phones are as follows: Blue tooth is not to be used at any time. If the blue tooth is active even a small bit, this leaves the phone open to all sorts of threats and attacks, as there are many weaknesses in the security of blue tooth. In addition, viruses and other malicious software can jump onto the mobiles via the blue tooth connection (Jakobsson, and lucent). This is the reason that we ask the blue tooth to remain off at all times. If text messages are sent to you, and you do not know who they are from, you are not to open these messages. Text messages are another way that infections can find their way onto mobile smart phones. They can infect immediately upon the messages being opened, if the software is written in such a way (Vamosi). Do not open any unknown emails. This means emails that are from outside the company. Emails can spread viruses and other malicious software to the phones (Vamosi). Do not plug the phones up to any computer systems. Hooking these phones into the network will expose them to even more dangers because as the phones are able to do more things, they are more capable of being hacked, since they now possess computer capability (Stone). Stay off the Internet. The Internet is crawling with viruses and malicious software that is just waiting to infect the smart phones (BBC). The best way to protect these phones is to stay off of the Internet entirely. The Internet is not needed to check product information, pricing, and to communication within the company. All of the information that will be needed can be accessed through the database. Your phones are programmed to be in line with our database. You will be able to log on without having to go out onto the Internet, which is a territory for all sorts of unknown threats that may lurk about. Do not load any personal effects onto the phones via an SD card or from any other device. Your content may carry some sort of infection without your knowledge, and such an infection can travel onto the phones and completely destroy them. Not to mention, engaging in such behavior is against the personal use policy, as it pertains to company mobile phones. Viruses and Other Malicious Software. All smart phones are subject to viruses, no matter the type. Even Blackberries are subject to be infected with viruses. Just because Blackberries run on a different operating system does not mean that they are exempt from infections from viruses and other malicious software. Blackberries can become infected in all of the same ways that Windows Mobile phones can become infected (Oregon State University; Research in Motion UK Limited). Knowing that all smart phones are subject to infections, we have installed virus protection software on these phones. The virus protection software runs in the background, working hard to keep viruses and other threats from sabotaging the phones. These programs run similarly to the virus protection software that runs on computer systems, as mobile smart phones are just like minicomputers (IT Pro). Because we have protection software installed on all mobile smart phones, we expect you to cooperate with us to see to it that the software is working effectively and efficiently by doing the following: Scan for viruses regularly. Make sure the software is always updated. If there are any problems with the software, contact an IT personnel immediately for help. Do not delay in doing this because every minute that the protection software is not working properly to protect the phone, that is every minute that the phone is at risk for attack (Stone). You are responsible for scanning your phone for harmful software on a regular basis. It is recommended that you scan it at the end of every work week. Do not; under any circumstances remove the protection software from the phones. Doing so will result in disciplinary action. You will want to refer to our policy often, as guidelines can change without notice. We will make amending and deletions to our policy as new issues arise. Essay Because mobile smart phones are a target for viruses, a security policy has been set in place to insure that the phones are exposed to as minimal risk as possible. This policy is not only in place to see to it that the phones remain free from threats that are imposed by malicious software and viruses, this policy is also in place to see to it that company information does not fall into the wrong hands. If a hacker really wants to, he can get his hands on whatever data he feels necessary to institute is plans, compromising the security of his victims (Svensson). If hackers feel the desire, they can easily do the same to the company and exploit any information that they see fit. So, the policy is outlined what is acceptable and not acceptable, as far as it pertains to use of the mobile phone and company affairs, as setting such guidelines is important not only for the security of the company but also for the employees (Avolio; LexisNexis, a division of Reed Elsevier Inc.). As far as legitimate use of the phone is concerned, the policy outlines this clearly. The policy lets employees know that the mobile phones that are provided to them are to be used for company affairs only. NO personal phone calls are to be made on these phones and either is other personal activity, such as sending and receiving text messages, sending and receiving email, and using any other data, accept to communicate with others in the company. When the workday is over, employees are to return their assigned phones to their lockers, and they can pick them up upon returning to work the next day. This is to insure that phones are not taken home, and nothing is done on them that will be against company policy. As far as parts of the policy that need to be reviewed in the short term, there are a few areas that are weak and that employees may be able to find a way around. For one, even though employees know that they are not allowed to take their phones home, some may sneak and do this anyway. The only way to insure that this does not happen is that some monitoring system will need to be in place to insure that all phones return to the lockers where they belong and do not leave the building with the employees at the end of the day. Another area of the policy that is weak is that it will be difficult to track whether or not the employees follow directions as far as hooking phones to computers is concerned. While we will be able to monitor some of the activity, it will be difficult to see to it that employees do not sneak and plug their phones into computers, due to there not being any restrictions on staff-staff are allowed to come and go as they please and do not have to report to reception. Aside from those couple of weaknesses, the company's security policy is clearly written, enough so that employees will understand exactly what is expected of them. Of course, if they do not understand something, the policy invites them to ask questions. If the policy is strictly adhered to, the phones will remain secure, costing the company less money for new equipment if the current equipment is destroyed by a virus or malicious software, which is capable of destroying the entire operating system of the phone (Stone). Work Cited Avolio, Frederick M. "PRODUCING YOUR NETWORK SECURITY POLICY." Avolio Consulting. N.p., July 2007. Web. 20 Jan. 2010. . This site gives a common sense approach to writing a policy of any kind. This source is better than all of the other sources on the Internet because it breaks things down and explains very clearly how to write a company policy. BBC News. "Cybercriminals revive old scams to target smartphones." News.bbc.co.uk. Ed. BBC News. BBC News, n.d. Web. 20 Jan. 2010. . This site talks about how criminals are capable of completely destroying a smart phone. This site is better than any that could be found on the web because while there were other resources that covered the subject, they were not as detailed as this one. Not to mention, this one is a very authoritative resource because it is a news article informing the public. IT Pro. "Do smartphones need security software." IT Pro. N.p., n.d. Web. 20 Jan. 2010. . This talks about why it is important for smart phones to have security software on them. This site is better than all of the rest because it is one of the only ones that could be found that had proper credentials, and it explained everything in great detail. Jakobsson, Markus, and Susanne Lucent. "Security Weaknesses in Blue Tooth." Lucent Technologies - Bell Labs. Information Sciences Research Center, n.d. Web. 20 Jan. 2010. . This is an article that discusses the weaknesses of the security in blue tooth. This article is the most authoritative of the sources that were found, being that it is published by a science lab, and it is written by experts in the telecommunication field. LexisNexis, a division of Reed Elsevier Inc. "Why You Need an Employee Policy for Electronic Information." Martindale.com. N.p., 2009. Web. 20 Jan. 2010. . This document demonstrates how to properly write a company security policy. While it is not as clear and in depth as the above source, it shows us the layout of a written policy, whereas the other source does not. This website provided an example policy for a law firm, it can apply in this case, as the document here is just an example as to how one is written. This source is better than all of the others on the web because it shows a clear layout of a company. Oregon State University. "Information on Blackberry -- Virus Diseases, An Online Guide to Plant Disease Control." Oregon State University. N.p., 1 Jan. 2009. Web. 20 Jan. 2010. . This is a very in depth guide on how one can protect the Blackberry. This is the best site on the net for the topic for a number of reasons. For one, out of all of the materials on the subject, this one had the best credentials, as it was written and maintained by a University. Secondly, the site provided the most information on the subject, as others sources were either too broad or did not have enough information. Research in Motion UK Limited. "BlackBerry Internet Service-Security Feature Overview--787371-0826030100-001-2.8." Blackberry.com. N.p., n.d. Web. 20 Jan. 2010. . This is a source that talks about security as it pertains to Blackberry smart phones. This is the absolute best source on the topic, since it came from the Blackberry site itself. Svensson, Peter. "Guide To Breaking Cell Phone Security REVEALED." Huffington Post. N.p., 30 Dec. 2009. Web. 20 Jan. 2010. . This source tells how criminals crack mobile phone security, putting users at risk. This is the best sources compared to others because the article was not only a news source, experts were cited. Stone, Brad. "As Phones Do More, They Become Targets of Hacking." New York Times. N.p., 21 Dec. 2009. Web. 27 Jan. 2010. . This article explains how hackers are able to hack into smart phones. This is the best article on the web because this is the only source that has the necessary information needed for the topic. There were articles on the subject, but most of the articles lacked proper credentials, which are important in research. Vamosi, Robert. "Security Watch: Your smart phone has a dumb virus." CNet.com. N.p., 2010. Web. 27 Jan. 2010. . This site tells how viruses can find their way onto smart phones, and it also talks about the signs of a virus. This site is better than all of the others on the web because it explains everything in great detail, and CNet is an authoritative technical source. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mobile Policy Assignment Example | Topics and Well Written Essays - 2750 words”, n.d.)
Mobile Policy Assignment Example | Topics and Well Written Essays - 2750 words. Retrieved from https://studentshare.org/technology/1516920-mobile-policy
(Mobile Policy Assignment Example | Topics and Well Written Essays - 2750 Words)
Mobile Policy Assignment Example | Topics and Well Written Essays - 2750 Words. https://studentshare.org/technology/1516920-mobile-policy.
“Mobile Policy Assignment Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/technology/1516920-mobile-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Policy for Mobile Phone Use

Mobile Phone Addiction

The theoretical basis for mobile phone use is dependency wherein individuals become extremely attached to a certain attitude or behaviour that its loss can sometimes impact negatively on a person's normal activities.... It tests theories on mobile phone use as well as addiction and considers their applicability for mobile phone use.... (2011), the authors set out to evaluate the pattern of mobile phone use among the youth population of Pakistan; the purpose of the authors was to identify the extent of addictive behaviour and its impact on usage....
13 Pages (3250 words) Literature review

Banning the Use of Mobile Phones In Motor Vehicles

Cellular phone use While Driving: Risks and Benefits.... A mobile phone with GPS (Global Positioning System) can save a lot of time if a person is lost.... Many studies have found that using a mobile phone while driving poses a risk of being in collision by more than four times.... This implies that quantifying the costs and benefits of this issue is complicated and should involve a number of inputs including the extent to which the use of mobile phone increases the chances of road crash, the amount of time used by the drivers to operate the mobile devices and the incremental value of making calls while driving....
5 Pages (1250 words) Essay

Should Drivers of Automobiles Be Prohibited from Using Cellular Phones

The essay explores the prohibition of cell phone use by drivers as a widely debated issue with people having divide opinions about the ban.... As the paper outlines, while those who support a total ban on the use of mobiles maintain that avoiding cell phone use will bring down the number of accidents and crashes, and those who are not in favor of the ban argue that reduction in accident rates cannot be brought about through such bans alone as drivers who are naturally prone to distractions will find other ways to engage themselves....
6 Pages (1500 words) Essay

Apples Entry into the Mobile Phone Market

The paper "Apple's Entry into the mobile phone Market" states that the emergence of smartphones in the wireless industry might have led to the increased hype in the global market but apart from the US, Apple's marketing strategy failed to win the faith of the European customers.... Apple's Entry into the mobile phone Market Introduction: Much before Apple announced the emergence of iPhone on January 9, 2007 there was much anticipation and speculation in the global mobile phone industry....
9 Pages (2250 words) Essay

Contribution of Mobile Phones in Road Accidents

?? Taylor et al suggest, “Further interventions aimed at decreasing mobile phone use among drivers should be considered” (Ric Bouvier 2003, Letter).... The purpose is to know the difference after a gap of 9 years on the same parameters of similar timings and locations, whether it has increased the rate of mobile phone use or decreased.... he purpose is to know the difference of epidemiology of mobile phone use between 2002 and 2011; whether the rate of mobile phone use has increased in men in comparison to women in 2011 or it is same could be found by conducting another study on the same parameters used in 2002....
10 Pages (2500 words) Research Paper

Banning the Use of Mobile Phones In Motor Vehicles

Cellular phone use While Driving: Risks and Benefits.... A mobile phone with GPS (Global Positioning System) can save a lot of time if a person is lost.... Many studies have found that using a mobile phone while driving poses a risk of being in collision by more than four times.... This implies that quantifying the costs and benefits of this issue is complicated and should involve a number of inputs including the extent to which the use of mobile phone increases the chances of road crash, the amount of time used by the drivers to operate the mobile devices and the incremental value of making calls while driving....
5 Pages (1250 words) Case Study

Mobile Telecommunications and the Impact on Economic Development

bservers are tolerant of users when mobile phone use is long-standing and high.... A third of them said playing mobile phone games in class was appropriate.... Currently, the smallest mobile phone has as much computing power as the largest and most expensive computer had few generations ago.... At the heart of any technological, mobile phone included, change depends on human experience.... The following steps describe some of the famous mobile phone developments in history. ...
7 Pages (1750 words) Report

Use of Mobile Phone and While Driving

From this data, 1% or 27 were attributed to incidents of mobile phone use.... mobile phone use & distraction while driving.... The aim of this paper "Use of mobile phone and While Driving" is to analyze the problem associated with driving while using mobile phones, solutions to these problems, and statistics on accidents associated with accidents in some regions across the world (Dorn, 2010).... The paper "Use of mobile phone and While Driving" is a good example of a term paper on social science....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us