If you want to develop a policy for the management of mobile devices in your organization – what should be included? What is in scope?
I’m assuming that a mobile device policy is an extension of a general IT or acceptable use policy and is likely to include, phones, smart phones, PDAs, scanners, tablets and other mobile devices.
I have included some ideas below – is there anything I’ve missed here?
Business Justification
Requirement – when do staff get issued a phone or mobile device? Which circumstances? What justification?
Jurisdiction – Is it a company-supplied device with company contract, a company-financed device with personal contract or outright personal device?
Sharing – Is it a shared or pooled device or allocated to one individual?
Device Choice – Do different types exist depending on circumstances e.g. smart phone or regular phone?
Internal Costing – How will the cost be internally charged? What happens if the device is surrendered before the end of the minimum contract term?
Mobile Asset Lifecycle
Security Register – Will the device be logged on a third party security register in the event of loss?
Device Recovery – How is a device recovered when a member of staff leave or no longer require a device?
Damaged Handsets – How are they handled, how are replacements managed? Insurance?
Device Asset Register – Phone Number, Device, International Mobile Equipment Identity (IMEI), Owner etc.
Loss or Theft
Handset Recycling / Sustainability
Acceptable Usage
Data Allowance, Data Roaming and Management Thereof
International calls and international data
How is usage monitored?
Call Barring
Personal Calls /Usage
Data Storage – e.g. MP3 storage? data backup?
IT Governance
User Privacy
Configuration Settings (e.g. should internet be routed through a corporate proxy)
Signature file
Dropbox or other other corporate data / Intellectual property controls
Skype policy
Usage whilst Driving or otherwise occupied
Health Advice
Social media policy
Email use
Server / network access policy
Auto-Lock policy
Apps – purchase of, use of, ownership, data usage, privacy settings etc.
Is there anything else to add here? Please leave a comment below or contact me directly. Thanks.
Shadow IT often spreads quietly and quickly becomes a serious risk. Just look at the UK-based supermarket chain Co-op. A little-known remote maintenance tool used by an external IT provider was compromised. The result? Nearly 800 ...
TLDR. ITAM Forum has the opportunity to join the Linux Foundation as a stand-alone, self-funded project. This article covers a) What’s happening b) Why I think it’s a great move for the ITAM Forum and c) ...
From 1st November 2025, Microsoft will remove all tiered pricing for Online Services under the Enterprise Agreement. This means all customers renewing or purchasing new Online Services after this date, will receive standard level A pricing ...
I delivered our “Managing AI as an Asset” training course the day before the Wisdom conference last week. Thank you to those who attended and provided feedback. It will be available on the LISA platform before ...
Since the ITAM Forum has been working in strategic partnership with the FinOps Foundation, I’ve come to admire the Crawl, Walk, Run approach to best practices, as it allows improvements and recommendations to meet the organisation ...
Shadow IT often spreads quietly and quickly becomes a serious risk. Just look at the UK-based supermarket chain Co-op. A little-known remote maintenance tool used by an external IT provider was compromised. The result? Nearly 800 ...
Managing AI in the enterprise is a team sport. In this article, I want to explore specifically what ITAM brings to the table as we enter the AI era. As I’ve mentioned in previous articles on ...