Access this Note and more by filling out your information.
When you register you will also receive:
- A Free Trial Membership which provides additional free research and help on your projects
- Access to survey data, contribute to our research, community involvement and much more
An unenforceable mobile policy is worth about as much as the paper it is printed on, so the enterprise has to carefully consider what can and cannot be enforced when crafting a mobile policy. Part of enforcement comes in the form of using technology to force proactive compliance, and the other part is defining reactive repercussions of non-compliance. As a starting point for developing an enterprise mobility policy, use the Info-Tech Advisor “Mobile Device Acceptable Use Policy” template.
Technology can help ensure mobile policy compliance in four key ways:
- Forcing encryption of data at rest on mobile devices.
- Forcing secure connectivity on unsecured public networks.
- Ensuring unauthorized mobile devices do not have access to the corporate network or company data.
- Ensuring mobile user spending is in line with the mobile policy and additional costs can be recovered.