Mobile Policy: Enforcement Is a Key Component

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

An unenforceable mobile policy is worth about as much as the paper it is printed on, so the enterprise has to carefully consider what can and cannot be enforced when crafting a mobile policy. Part of enforcement comes in the form of using technology to force proactive compliance, and the other part is defining reactive repercussions of non-compliance. As a starting point for developing an enterprise mobility policy, use the Info-Tech Advisor “Mobile Device Acceptable Use Policy” template.

Technical Controls

Technology can help ensure mobile policy compliance in four key ways:

  1. Forcing encryption of data at rest on mobile devices.
  2. Forcing secure connectivity on unsecured public networks.
  3. Ensuring unauthorized mobile devices do not have access to the corporate network or company data.
  4. Ensuring mobile user spending is in line with the mobile policy and additional costs can be recovered.

Hide Details

Search Code: 2951
Published: January 13, 2009
Last Revised: January 13, 2009

Related Content

GET HELP Contact Us
VL Methodology