...
Mobile devices (also commonly referred to as “user endpoint devices”) include items such as:
Laptops
Notebooks
Tablet devices
Smartphones
Smart watches
The purpose of this policy is to set out the controls that must be in place to secure each step in the lifecycle of a mobile device, including when employees are using mobile devices provided by Vertic Pty Ltd. It is intended to mitigate the following risks:
Loss or theft of mobile devices, including the data on them
Compromise of classified information held or accessed via a mobile device
Introduction of viruses and malware to the network
Loss of reputation caused by incidents relating to a mobile device
It is important that the controls set out in this policy are always observed in the provision, use and transport of mobile devices. The use of personally owned mobile devices to access corporate data is addressed separately in the BYOD Policy.
...
The following policies and procedures are relevant to this document:
Access Control Policy
User Access Management Process
Mobile device policy
Selection and sourcing of mobile devices
...