Mobile workforce management tips: Sample security policies, templates

Learn how to employ mobile workforce management strategies to improve the security of your organization without reinventing the wheel. Check out our sample policies and templates.

The availability of wireless devices, secured wireless networks, mobile applications, virtual desktops and, of

course, smartphones, has provided small to medium-sized businesses with new mobile workforce opportunities.

However, a mobile workforce requires tighter controls around acceptable use, security and support, and a strong mobile workforce management strategy.

How prepared is your organization for the wealth of mobile technologies your staff is beginning to take advantage of? To help address mobile workforce management overload, we've pulled together some sample mobile policies and templates to consider.


Mobile workforce management tips


SOURCE: SearchMidmarketSecurity.com
 

OFFERING: A step-by-step tip detailing the four key areas of a mobile device management policy and how to create one for a midsized organization.

SOURCE: SearchFinancialSecurity.com
OFFERING: Tips for creating a mobile device security policy, including necessary aspects to address and typical security threats.


Sample mobile device management policies and templates


SOURCE: Purdue University
OFFERING: A sample mobile device policy detailing acceptable use policies and security precautions for IT and users to follow.

SOURCE:The SANS Institute
OFFERING: A free remote access policy template for establishing control of mobile computing and storage devices.

SOURCE: Carnegie Mellon University
OFFERING: An example of a mobile devices support statement highlighting supported and unsupported devices and recommended support options.

SOURCE: Oregon Department of Administrative Services
OFFERING: A sample of an internal mobile device policy, including specific guidelines highlighting security and compliance issues.

Let us know what you think about the story; email editor@searchcio-midmarket.com.

This was first published in July 2010

Dig deeper on Data centers and virtualization for Small Business

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close