• Mobile health care deployment: Technical requirements

    IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.

  • Streamlining mobile device management with SaaS

    Successful mobile device management includes collecting and maintaining tax documentation, managing expense reports and streamlining mobile device administration costs. Learn about the tax liabilit...

  • Securing corporate data on your laptops

    This series outlines what laptop security means to your business, how to protect your valuable corporate data residing on your laptops and shows you how laptop weaknesses are being exploited. It co...

  • Podcast: FAQs on mobile policies

    In this 10 minute podcast, you'll get answers and approaches to frequently asked questions about developing corporate mobile policies, including key considerations for creating customized policies ...

Mobile Policies and Procedures

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Mobile device security policies: Asserting control over mobile devices

    Experts all recommend having mobile device security policies, but a policy is worthless without the technology and processes to back it up. Managers and architects responsible for planning mobile deployment need to understand the nuts and bolts of de... 

  • Securing corporate data on your laptops

    This series outlines what laptop security means to your business, how to protect your valuable corporate data residing on your laptops and shows you how laptop weaknesses are being exploited. It concludes with an outline of the steps you can take imm... 

  • Developing and instituting corporate mobile device policies

    As enterprise mobile connectivity becomes increasingly pervasive, IT organizations face the challenge of creating mobile policies that allow users to be productive, while at the same time protecting corporate assets. This series is aimed at helping e... 

  • Detecting rogue mobile devices on your network

    Controlling what mobile devices connect to your network is crucial, whether those devices are local or remote, stationary or mobile. Many enterprises use application portals, mail servers and/or VPN gateways to detect and restrict mobile access, comp... 

  • Mobile security policies

    Mobile security policies are necessary for a safe mobile environment. In this series you'll discover three key elements that are essential to your mobile security policy and learn how government regulations affect what is required in your policy. 

  • BlackBerry usage policy and agreement

    Download this editable BlackBerry usage policy and agreement template and ensure your organization is protecting its corporate data, computer systems, networks, etc. from unauthorized use and/or malicious attack that could result in loss of informati... 

  • Mobile management: Advice for mobile managers

    This series on mobile management lays out the key issues for enterprise management, mobility management, and device management. It delves into such topics as mobile architectures and processes, mobile-specific management solutions, carrier mobile dev... 

  • Wireless network security testing: Step 3: Demonstrating threats

    The abundance of wireless devices is making wireless networks -- both authorized and unauthorized -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. 

  • Products of the Year 2005

    You are invited to submit your company's mobile product(s) to be considered for our Products of the Year awards. Winning products will be highlighted in a special feature on SearchMobileComputing.com in January 2005. 

  • Mobile data technologies -- done right -- can make your company more agile and competitive

    Some basic concepts and valuable tips for productively and securely implementing technologies for wireless Internet access. 

  • See more Essential Knowledge on Mobile Policies and Procedures
  • Remote access problems: BYOD muddies the water

    BYOD enterprise policies are creating new remote access problems on the WAN. Find out how to get a better handle on iPads and smartphones invading your VPN. 

  • Tablet security calls for mobile policy, controlling mobile apps

    Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down. 

  • Mobile security is end user and IT responsibility

    Mobile security is not top-of-mind for many mobile workers, according to recent research by Cisco and the National Cyber Security Alliance. 

  • Mobile device encryption - a practice not often applied

    Encryption is the best way to protect data on mobile devices -- but too few companies are actually deploying this critical technology. 

  • Firm eases pain of patch management for mobile workforce

    Patch management can be costly and timely, especially if you've got a number of remote workers. But one IT manager found a way to streamline the process with an online tool that he says gives a better view of the patch management operation. 

  • Fidelity laptop snafu spotlights need for security policies

    The theft last week of a Fidelity-owned laptop containing sensitive data on thousands of clients could have easily been prevented. Are your users paying attention when it comes to laptop security? 

  • Many mobile workers without basic security measures

    Enterprises are failing to confront threats to mobile devices, according to a survey, and as a result are suffering security breaches. 

  • Where to go to eavesdrop on wireless networks

    A new survey of four major metropolitan areas shows businesses are leaving themselves wide open to attack. Blame the industry as much as the enterprise. 

  • A lesson from Paris

    For a rich and beautiful hotel heiress, Paris Hilton's had it rougher than you might think. News Editor Eric B. Parizo explains why and the lessons you can learn from her folly. 

  • The wrong places for mobile applications

    While mobile enterprise applications get plenty of press coverage, the truth is that few companies are really using them, according to a recent report by Forrester Research Inc. Existing network problems and a slow economy may be partly to blame, but... 

  • hard reset (factory reset; master reset)

    A hard reset, also known as a factory reset or master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it left the factory. All settings, applications and data added by the user are removed. 

  • iOS Erase

    iOS Erase is a feature that obliterates everything stored in the iOS encrypted file system’s user partition. All user partition contents – including contacts, calendars, device settings, third-party applications, and associated application data – bec... 

  • Android Factory Reset

    Android Factory Reset is a feature that erases all device settings, user data, third-party applications, and associated application data from an Android device’s internal flash storage to return the device to the condition it was in when shipped from... 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • Mobile device policy: How to create, apply and enforce rational rules

    Establishing a clear mobile device policy can help enterprises achieve real business benefits. Mobile expert Michael Finneran discusses crafting a mobile device policy and applying it to mobile users. 

  • Podcast: FAQs on mobile policies

    In this 10 minute podcast, you'll get answers and approaches to frequently asked questions about developing corporate mobile policies, including key considerations for creating customized policies for individual enterprises. 

  • hard reset (factory reset; master reset)

    A hard reset, also known as a factory reset or master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it left the factory. All settings, applications and data added by the user are removed. 

  • iOS Erase

    iOS Erase is a feature that obliterates everything stored in the iOS encrypted file system’s user partition. All user partition contents – including contacts, calendars, device settings, third-party applications, and associated application data – bec... 

  • Android Factory Reset

    Android Factory Reset is a feature that erases all device settings, user data, third-party applications, and associated application data from an Android device’s internal flash storage to return the device to the condition it was in when shipped from... 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • Remote access problems: BYOD muddies the water

    BYOD enterprise policies are creating new remote access problems on the WAN. Find out how to get a better handle on iPads and smartphones invading your VPN. 

  • Mobile application security best practices: Leveraging MDM, MAM tools

    Following mobile application security best practices can aid IT's mobile application management efforts and mitigate the risks of employees installing mobile apps on their devices. 

  • Managing mobile application security in the BYO device era

    Users love downloading apps, which can make mobile application security, especially on employee-owned BYO devices, difficult to ensure. Find out how to improve mobile app security. 

  • Meeting technical requirements for mobile health care deployments

    IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security. 

  • Mobile device strategy bypassed as enterprises face tablet invasion

    The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis. 

  • What to look for in mobile device management systems

    Learn about the core functions of mobile device management (MDM) systems so you can select the most comprehensive MDM system for your enterprise needs. 

  • See more All on Mobile Policies and Procedures
About Mobile Policies and Procedures

Learn about mobile device policies and procedures including how to create a mobile device strategy and improve the effectiveness of your mobile policies in this topic section. Discover why every organization must create and implement a mobile security policy and how implementing the proper mobile policies are critical to your mobile device strategy. Read how forward-thinking organizations are using effective mobile device policies to enhance the employee productivity while safekeeping their data in motion and their mobile devices.