Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Best Practices > Configuration - Pg. 367

MobileMalwareMitigationMeasures·Chapter11 367 The following are some common use issues such policies often address: Can the device be used for personal activity? (calls, e-mail, Web browsing) Can the device be used on Wi-Fi networks? (office, home, public) Can features like Bluetooth be enabled? If so, should the device be discoverable? Can the user install additional software on the device? From what sources? (IT, vendor-supported, Internet downloads, others) Can the user synchronize the device to their work computer? What information can be kept on the phone? Can the user keep work-related files on the device? Will the phone be required to have a security code or unlock PIN? Will the phone be required to have encryption capability for sensitive data? What is the procedure for reporting a lost phone?