Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

An unenforceable mobile policy is worth about as much as the paper it is printed on, so the enterprise has to carefully consider what can and cannot be enforced when crafting a mobile policy. Part of enforcement comes in the form of using technology to force proactive compliance, and the other part is defining reactive repercussions of non-compliance. As a starting point for developing an enterprise mobility policy, use the Info-Tech Advisor “Mobile Device Acceptable Use Policy” template.

Technical Controls

Technology can help ensure mobile policy compliance in four key ways:

  1. Forcing encryption of data at rest on mobile devices.
  2. Forcing secure connectivity on unsecured public networks.
  3. Ensuring unauthorized mobile devices do not have access to the corporate network or company data.
  4. Ensuring mobile user spending is in line with the mobile policy and additional costs can be recovered.

Also In

Enable a Truly Mobile Workforce

Stop fighting, start embracing.

Related Content

Hide Details

Search Code: 2951
Published: January 13, 2009
Last Revised: January 13, 2009


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.