BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Put it on paper: A guide to mobile device policy creation

Last updated:November 2013

Editor's note

In the BYOD era, data leakage and mobile malware are top concerns for IT pros, but crafting a strong mobile device policy and distributing that information to users can mitigate some of the risks.

Although writing a mobile device policy isn't the most exciting task, it's an important one. These policies can prevent some serious problems, such as sensitive corporate data leaking or a virus making its way onto your network. There are different policies that can help head off problems, such as bring your own device (BYOD), mobile device security and acceptable use policies. When employees know what's expected of them, they're less likely to break the rules.

Of course, policies themselves don't stop workers from violating regulations, so you'll need ways to enforce those rules, such as mobile device management (MDM) and other tools. Take a look at these tips for writing successful policies, learn about more advanced facets of enforcement and watch experts weigh in on the importance of writing down regulations in the consumerization age.

1Helpful hints

Once you get the appropriate policies in place, make sure they're going the distance. That means following through on enforcing the rules, making updates to the policies as needed and disseminating the rules to users. When the whole organization is on board with keeping devices secure, it makes your job as an IT pro a little easier.

2Videos

Everyone has something to say about how and why to implement security standards and policies in the enterprise. Hear what some experts in the field have to say on the matter in these videos.

3Pop quiz

Now that you're an expert on mobile device policy and preventing data left, take this quiz and prove it!

4Glossary

Learn more about corporate mobility policies with these definitions.

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close