RETIRED CONTENTPlease note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.
An unenforceable mobile policy is worth about as much as the paper it is printed on, so the enterprise has to carefully consider what can and cannot be enforced when crafting a mobile policy. Part of enforcement comes in the form of using technology to force proactive compliance, and the other part is defining reactive repercussions of non-compliance. As a starting point for developing an enterprise mobility policy, use the Info-Tech Advisor “Mobile Device Acceptable Use Policy” template.
Technology can help ensure mobile policy compliance in four key ways:
- Forcing encryption of data at rest on mobile devices.
- Forcing secure connectivity on unsecured public networks.
- Ensuring unauthorized mobile devices do not have access to the corporate network or company data.
- Ensuring mobile user spending is in line with the mobile policy and additional costs can be recovered.