Legistify Services private limited
Mobile Device Management Policy
Effective Date: [Insert Date]
Document Name: | Mobile Device Management Policy |
|
|
Classification: | Internal |
|
|
Document Owner: | CISO/MR- |
|
|
Document Approver: | Top Management |
|
|
Original Document Issue Date: | 10/09/2023 |
|
|
Current Edition: | Version 2.0 |
|
|
Revision History: |
|
|
|
S. No. | Description of Change | Date of Change | Version No. |
1 | Initial Release | 10/09/2023 | 1.0 |
2 | Second Release | 10/09/2024 | 2.0 |
3 |
|
|
|
5 |
|
|
|
6 |
|
|
|
7 |
|
|
|
Introduction
This Mobile Device Management (MDM) Policy outlines the guidelines and procedures for managing mobile devices, including smartphones and tablets, used by employees, contractors, and other authorized users of Legistify Services private limited.
The purpose of this policy is to establish security controls, protect sensitive information, and ensure the appropriate use of mobile devices within the organization.
Scope
This policy applies to all mobile devices that access or store organizational data and connect to Legistify Services private Limited’s network.
All employees, contractors, and other authorized users with mobile devices connected to the organization's network are subject to this policy.
Device Registration and Authorization
All mobile devices used for work purposes must be registered with the organization's Mobile Device Management (MDM) system.
Only authorized devices with appropriate security configurations will be allowed to connect to the organization's network.
Security Configuration
Mobile devices must have security configurations, including PIN or password protection, encryption, and device locking, as per organizational standards.
Devices not meeting security requirements will be denied access to organization resources.
Lost or Stolen Devices
Users must report lost or stolen devices immediately to the IT department.
IT will remotely wipe or lock the device to prevent unauthorized access to sensitive information.
Remote Monitoring and Management
The organization reserves the right to remotely monitor and manage mobile devices to ensure compliance with security policies.
Monitoring activities may include device location tracking, application usage, and security status.
Software Installation and Updates
Only approved and authorized applications may be installed on mobile devices.
Users are responsible for keeping their devices updated with the latest security patches and firmware releases.
Data Protection and Privacy
Sensitive organizational data must be stored securely on mobile devices using approved encryption methods.
Personal data on devices used for work purposes should be limited to what is necessary for business functions.
Access Control and Authentication
Access to organizational resources from mobile devices will be protected with strong authentication methods, such as multi-factor authentication (MFA).
Access permissions will be based on the principle of least privilege.
Network Security
Mobile devices must connect to the organization's network through secure and authorized channels, such as Virtual Private Network (VPN) connections.
Public Wi-Fi networks should be avoided, and users must connect to secure networks whenever possible.
Employee Responsibilities
Employees are responsible for the security and appropriate use of their assigned mobile devices.
Employees must report any security incidents, loss, or suspected compromise of their mobile devices promptly to the IT department.
Training and Awareness
Employees will receive training on mobile device security best practices and the organization's MDM policies during onboarding and periodically thereafter.
Regular awareness programs will be conducted to keep employees informed about the importance of mobile device security.
Policy Review and Compliance
This policy will be reviewed and updated at least annually or as needed to address changes in the organization's structure, technology, or regulations.
Compliance with this policy will be monitored through regular audits and assessments.
Enforcement
Violations of this Mobile Device Management Policy may result in disciplinary action, including suspension of mobile device privileges, retraining, or termination of employment.
Employees are encouraged to report any breaches or violations promptly and may do so without fear of retaliation.
By adhering to this Mobile Device Management Policy, we enhance the security and manageability of mobile devices used within Legistify Services private limited.
Policy Revision History
Date | Version | Author | Reviewer | Approver | Comments |
10/09/2023 | 0.1 | ISMS Manager | CIO | Management | Draft Version of Mobile Device Management Policy |
|
|
|
|
|
|
|
|
|
|
|
|