We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Mobile Policy - Assignment Example

Comments (0)
This is a mobile security policy outlining the proper use of company mobile phones. This policy covers how to handle the company phones safely and minimize risks of threats. This policy pertains to both the Windows Mobile and Blackberry Smart Phones. Along with explaining the risks of the threats that exist for mobile smart phones, this policy also outlines how such threats can be minimized, so the mobile phones can remain protected.
Download full paper
Mobile Policy
Read TextPreview

Extract of sample
Mobile Policy

Download file to see previous pages... The company mobile phones that will be supplied are Windows mobile Smart Phones and Blackberries. You have the choice to decide which you will use. When a phone is issued to you that is the phone that you will keep. When leaving at the end of the day, you will return the phone to your locker and use it again when you return to work the following day.
Company Security. While mobile smart phones are an innovative tool, we must remember that they can be hacked because they are designed similar to computers (Svensson). Because of this, confidential company information, such as account numbers and the like, is not to be shared on these phones via data usage. It is perfectly fine to give such information over the phone, as it may become necessary; however, sending and receiving it via data is strictly prohibited.
Personal Use of Company Mobile Phones. Company mobile phones are not to be used for personal use in any way, shape, or form. They are for company communications only. We mandate this to keep the risks of infected software, such as virus and spyware finding their way onto the phone, via text message and downloads, to a minimum. The following is considered to be personal use of the mobile devices:

Calling friends or making other personal calls outside of company communications.
Downloading pictures, music, ring tones, software, and other media.
Taking pictures or using the camcorders.
Sending text messages other than for company communications.
Surfing the Internet.
Going on social network sites.
Loading pictures and software onto the phone via an SD card or other storage device.

If you wish to engage in personal use of a phone on the job, you may use your own mobile device on breaks and during lunch. You are not to deal with anything personal while on the clock. Furthermore, we are not responsible for the protection or security of your personal mobile devices. You use them at your own risk.

Security Measures that are to be taken. Aside from observing the rules about personal usage, it is important that all of the security measures are strictly followed. If these security measures are not adhered to, then the mobile phones will be at risk. The security measures that are to be adhered to in regards to the mobile smart phones are as follows:

Blue tooth is not to be used at any time. If the blue tooth is active even a small bit, this leaves the phone open to all sorts of threats and attacks, as there are many weaknesses in the security of blue tooth. In addition, viruses and other malicious software can jump onto the mobiles via the blue tooth connection (Jakobsson, and lucent). This is the reason that we ask the blue tooth to remain off at all times.
If text messages are sent to you, and you do not know who they are from, you are not to open these messages. Text messages are another way that infections can find their way onto mobile smart phones. They can infect immediately upon the messages being opened, if the software is written in such a way (Vamosi).
Do not open any unknown emails. This means emails that are from outside the company. Emails can spread viruses and other malicious software to the phones (Vamosi).
Do not plug the phones up to any computer systems. Hooking these ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Future of Mobile Global Business
Several studies have been conducted in the recent years aimed at analysing the challenges and trends as pertains to the use of mobile applications and their contribution in business. The only problem is that, a greater number of these studies have failed to address the future of the mobile industry.
12 Pages(3000 words)Assignment
Managing for the future: Mobile Telecomunication Network (Nigeria)
The review would be based on their operations and policies between 2006 and 2012. This would be followed by an assessment of the contextual environment over the next 6-8 years, say up to 2018-2020. MTN profile MTN Nigeria (MTNN), a part of the MTN Group, is Africa’s leading cellular telecom company (MTN Online, 2012).
28 Pages(7000 words)Assignment
Business Structures of the 21st Century: Grapple Mobile
The Grapple always tends to meet the increasing needs for mobile applications building by investing heavily in R&D sector (Figaro Digital). The organisation holds the latest mobile technology so as to gain market attention effectively. While analysing the internal market environment of the Grapple, it seems that the company faces high degree competition from a number of huge market players including Apple and Android.
6 Pages(1500 words)Assignment
Information Security Policy Document (ISPD)
tory ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 9 Analysis of ISPD ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Page 9-11 Conclusion ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 11-12 References ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Page 13 Introduction and Methodology As this is an information age, information is now in the form of digits that flows on an electronic computerized network.
9 Pages(2250 words)Assignment
Mobile Telecommunications
Vodafone was formed in 1984 as a subsidiary of Racal Electronics Plc. In September 1991, it was fully de-merged from Racal Electronics Plc and became an independent company, at which time its name changed to Vodafone Group Plc (www.vodafone.com). Between 1991 and 1999, the Group consolidated its position in the UK and enhanced its international interests through a series of transactions.
10 Pages(2500 words)Assignment
Mobile Commerce
TravelnTrot.com is a global online ticketing service based in the UK that provides travel deals, hotel deals, tour information and tour packages, as well as last minute ticketing services and airfare deals to customers in the UK and worldwide. This business plan would focus on the information services that could be used by TravelnTrot to attract or inform mobile users using the emerging facilities of m commerce.
22 Pages(5500 words)Assignment
Mobile application
will include popular games and other mobile applications such as Apple iOS 4.1, Sky + Remote Record Android, Facebook for Android 1.3, Skype for iOS4, etc. Only the application that is supported by common devices such as, Windows Mobile, Blackberry, Java, etc, will be added to
1 Pages(250 words)Assignment
Question 1 (b) IP in IP Tunneling are used to forward information between end points acting as a bridge between portion of an IP network that have different capabilities. A
5 Pages(1250 words)Assignment
Mobile devices
The major role of mobile devices in the creation of effective organizations is demonstrated by their important role in communication within an organization (David 127). Communication is one of the core functions of
3 Pages(750 words)Assignment
Strategic Audit on T-Mobile
Dallas/Fort Worth, Philadelphia, Las Vegas, San Francisco, Los Angeles, Miami, Detroit, New York, Orlando/Jacksonville, Boston, Sacramento, and Tampa/Sarasota. T-Mobile and MetroPCS are its flagship products. By end of 2012 T-Mobile had the license for wireless broadband
7 Pages(1750 words)Assignment
Let us find you another Assignment on topic Mobile Policy for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us