Nobody downloaded yet

Mobile Policy - Assignment Example

Comments (0) Cite this document
This is a mobile security policy outlining the proper use of company mobile phones. This policy covers how to handle the company phones safely and minimize risks of threats. This policy pertains to both the Windows Mobile and Blackberry Smart Phones. Along with explaining the risks of the threats that exist for mobile smart phones, this policy also outlines how such threats can be minimized, so the mobile phones can remain protected.
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Mobile Policy
Read TextPreview

Extract of sample
"Mobile Policy"

Download file to see previous pages The company mobile phones that will be supplied are Windows mobile Smart Phones and Blackberries. You have the choice to decide which you will use. When a phone is issued to you that is the phone that you will keep. When leaving at the end of the day, you will return the phone to your locker and use it again when you return to work the following day.
Company Security. While mobile smart phones are an innovative tool, we must remember that they can be hacked because they are designed similar to computers (Svensson). Because of this, confidential company information, such as account numbers and the like, is not to be shared on these phones via data usage. It is perfectly fine to give such information over the phone, as it may become necessary; however, sending and receiving it via data is strictly prohibited.
Personal Use of Company Mobile Phones. Company mobile phones are not to be used for personal use in any way, shape, or form. They are for company communications only. We mandate this to keep the risks of infected software, such as virus and spyware finding their way onto the phone, via text message and downloads, to a minimum. The following is considered to be personal use of the mobile devices:

Calling friends or making other personal calls outside of company communications.
Downloading pictures, music, ring tones, software, and other media.
Taking pictures or using the camcorders.
Sending text messages other than for company communications.
Surfing the Internet.
Going on social network sites.
Loading pictures and software onto the phone via an SD card or other storage device.

If you wish to engage in personal use of a phone on the job, you may use your own mobile device on breaks and during lunch. You are not to deal with anything personal while on the clock. Furthermore, we are not responsible for the protection or security of your personal mobile devices. You use them at your own risk.

Security Measures that are to be taken. Aside from observing the rules about personal usage, it is important that all of the security measures are strictly followed. If these security measures are not adhered to, then the mobile phones will be at risk. The security measures that are to be adhered to in regards to the mobile smart phones are as follows:

Blue tooth is not to be used at any time. If the blue tooth is active even a small bit, this leaves the phone open to all sorts of threats and attacks, as there are many weaknesses in the security of blue tooth. In addition, viruses and other malicious software can jump onto the mobiles via the blue tooth connection (Jakobsson, and lucent). This is the reason that we ask the blue tooth to remain off at all times.
If text messages are sent to you, and you do not know who they are from, you are not to open these messages. Text messages are another way that infections can find their way onto mobile smart phones. They can infect immediately upon the messages being opened, if the software is written in such a way (Vamosi).
Do not open any unknown emails. This means emails that are from outside the company. Emails can spread viruses and other malicious software to the phones (Vamosi).
Do not plug the phones up to any computer systems. Hooking these ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Mobile Policy Assignment Example | Topics and Well Written Essays - 2750 words”, n.d.)
Mobile Policy Assignment Example | Topics and Well Written Essays - 2750 words. Retrieved from
(Mobile Policy Assignment Example | Topics and Well Written Essays - 2750 Words)
Mobile Policy Assignment Example | Topics and Well Written Essays - 2750 Words.
“Mobile Policy Assignment Example | Topics and Well Written Essays - 2750 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Mobile home
...? Developing Sustainable Structures Mobile Home Valued eMachines Mobile Homes Mobile home is a prefabricated design that, due to its ease with mobility, is constructed for a short term dwelling. They are generally used in areas where climatic conditions are friendly. In addition to the climatic conditions, a number of factors also provide for viability of such homes, such as: availability of proper transportation mechanism, ability to sustain environmental and man-made stresses, the endurance to bear weather variations and the technical support in case of any move pertaining to these homes. Mobile homes are being fabricated in advanced countries because...
8 Pages(2000 words)Essay
Mobile investigation
...?Mobile Investigation Introduction: In modern world mobile phone tracking is a key part associated with any kind of investigation. In any criminal case or in any kind of mental or physical harassment case, tracking of mobile number be itfor location training or tracking the contact list all is always helpful to reach the truth behind any crime. Among all the recent technological expansions that have extended the surveillance competences of law execution agencies is the location tracking system of the mobile phone. Although many people used to believe the fact that this mobile phone location tracking system implementation in the investigation process is at...
4 Pages(1000 words)Essay
Mobile Computing and Mobile Computing Security
...Mobile Computing and Mobile Computing Security Introduction to Mobile Computing Mobile computing involves the use of computing and communications devices to transfer data and other forms of communications even without a direct physical link between the source and recipient device (Shriraghavan et al, 2003). It is also refers to use the use of compact, portable computing devices such as laptops, pocket computers, Personal Digital Assistants (PDA's) and other similar devices that use wireless technology ("Mobile computing", 2006). Mobile computing has it's roots on radio communications in the 1950's and 60's where the use of automobiles...
6 Pages(1500 words)Essay
Mobile Phones
...Mobile Report Mobile Report amung' phone are a widepread and popular a Nokia thee day and that ucce ha come a a reult of conitently producing leek, good-looking handet with ma appeal. But amung alo want a lice of the iPhone action, it would eem, and ha made a big effort to produce one of it very own. The Omnia, like the HTC Touch Diamond, i baed on Window Mobile Profeional 6.1 and like the Diamond it replace large part of Microoft' ugly and fiddly martphone uer interface with one of amung' deign in an attempt to provide an iPhone-tyle touch creen experience. (Ahonen and Melkko, 2008, 44-99) Phyically, it' very imilar to the iPhone 3G, much more o than the Diamond, complete with lim,...
14 Pages(3500 words)Coursework
Mobile report
...Mobile Report‏ Mobile Report‏ Ѕamѕungѕ phoneѕ are aѕ wideѕpread and popular aѕ Nokiaѕ theѕe dayѕ and that ѕucceѕѕ haѕ come aѕ a reѕult of conѕiѕtently producing ѕleek, good-looking handѕetѕ with maѕѕ appeal. But Ѕamѕung alѕo wantѕ a ѕlice of the iPhone action, it would ѕeem, and haѕ made a big effort to produce one of itѕ very own. The Omnia, like the HTC Touch Diamond, iѕ baѕed on Windowѕ Mobile Profeѕѕional 6.1 and like the Diamond it replaceѕ large partѕ of Microѕoftѕ ugly and fiddly ѕmartphone uѕer interface with one of Ѕamѕungѕ deѕign in an attempt to provide an iPhone-ѕtyle touch ѕcreen experience. (Ahonen and Melkko, 2008, 44-99) Phyѕically, itѕ very ѕimilar to the iPhone 3G, much...
8 Pages(2000 words)Coursework
Mobile application
...Running Head: MOBILE APPLICATION Mobile Application Mobile Application Business Plan Concept:My business plan is based on the concept of online business. I would like to open an online business that provides a full integrated Mobile application services. I want to host a website that provides all kinds of applications for mobile phones. The website will include popular games and other mobile applications such as Apple iOS 4.1, Sky + Remote Record Android, Facebook for Android 1.3, Skype for iOS4, etc. Only the application that is supported by common devices such as, Windows Mobile, Blackberry, Java, etc, will be added to...
1 Pages(250 words)Assignment
Mobile commerce
...Mobile Commerce Cellular phones and other mobile devices are becoming more popular in the world. More applications are being added into them. Theseinclude SMS, internet access, multimedia, e-mail, software and Bluetooth. This has triggered the use of M-commerce as an effective way of communicating with customers. Transfer of the rights to company products and services can now be successfully done online. This is done using mobile devices, for example, PDA, smartphones, custom terminal, mobile phones and public mobile network. These have had a positive impact in commerce. There is more to be done and areas to be covered so as to realize the potential benefits of global of M-commerce. Its constrains and threats should also be dealt... with. ...
8 Pages(2000 words)Research Paper
...PAPER SOLUTION Question a Users on the move come across access point change when they move from one place to another. when a mobile enters new network Terminal Communication Agent (TCA) are informed about the new position .the care of address is used when a mobile is outside their parent cloud(foreign network).Further Mobile I.P specifies how a mobile node registers with its home agent Question 1 (b) IP in IP Tunneling are used to forward information between end points acting as a bridge between portion of an IP network that have different capabilities. A typical use of IP in IP tunneling is forwarding of IP multicast traffic from one area of intranet to another area of...
5 Pages(1250 words)Assignment
Mobile Messaging
...Mobile Messaging Introduction Mobile messaging is a phenomenon that has been witnessed all over the world. Mobile messaging refers to the creation, the storage and exchanging of texts, images and voice messages through electronic means aided by the use of a mobile phone. The growth and use of mobile messaging in the world has grown exponentially especially with the rollout of the various applications that support mobile messaging. This has further been boosted by the increased use of smartphones in the current society. The use of mobile messaging has been widely associated with the youth but the trend has changed with...
8 Pages(2000 words)Essay
Mobile device policy in healthcare
...Mobile Device Policy in Healthcare Use of mobile devices and applications is becoming a common place in health care institutions. Most health care practitioners use mobile devices to access records of patients, prescribe drugs, conduct diagnosis, refer and research about health care issues. The Protected Health Information (PHI) is one of the elements that mobile devices help health care practitioners to practice. PHI has some issues that make it of great interest to practitioners in health care sector. In its broadest definition, PHI refers to any information regarding health status, payment history and health history or a particular person...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Assignment on topic Mobile Policy for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us