Mobile Computing Policy

Mobile Computing Policy

The Mobile Computing Policy addresses the actions that must be taken by the Company’s personnel who have mobile computing equipment, or who are temporarily using mobile computing equipment.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
3.1 PHYSICAL SECURITY
3.2 ACCESS CONTROL/ AUTHENTICATION
3.3 DATA PROTECTION
4. POLICY STATEMENT
4.1 ON COMPANY PREMISES
4.2 OUTSIDE COMPANY PREMISES
4.3 PERSONAL USE
5. RESPONSIBILITIES
5.1 EMPLOYEES
5.2 MANAGERS
5.3 IT
6. EXCEPTIONS
7. FINAL CONSIDERATIONS
7.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
7.2 DOCUMENT REVISION

Pages: 10

Review Mobile Computing Policy.

Related Products:

€1,699.00

Purchase

This bundle contains all the products listed in the Data Governance section. Take advantage of the 25% OFF when buying the bundle!

€49.00

Purchase

The Compliance and Auditing Policy defines the approach to be taken to ensure the Company is compliant with legal, statutory, regulatory and contractual obligations related to information security and of ant security requirements, standards and internal policies, guidelines and processes mandated by the Company.

€79.00

Purchase

The purpose of this Business Continuity Plan Procedure is to provide an effective, fit-for-purpose, predefined and documented framework and process to enable the Business Continuity Management of the Company’s Mission Critical Activities and their dependencies.