0% found this document useful (0 votes)
100 views7 pages

Mobile Device Policy

This document outlines a mobile device policy for RECOM CONSULTING LIMITED. It covers the use of personal mobile devices for work purposes, use of company-owned mobile devices, security requirements, appropriate usage, and privacy. The policy aims to enable authorized mobile device usage while protecting company data and networks.

Uploaded by

Kamrul Hasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views7 pages

Mobile Device Policy

This document outlines a mobile device policy for RECOM CONSULTING LIMITED. It covers the use of personal mobile devices for work purposes, use of company-owned mobile devices, security requirements, appropriate usage, and privacy. The policy aims to enable authorized mobile device usage while protecting company data and networks.

Uploaded by

Kamrul Hasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

MOBILE DEVICE POLICY

RECOM CONSULTING LIMITED


ISO 27001:2013

House 18 (Flat B2), Road 1/A, Block J, Baridhara, Dhaka 1212


ISMS FRAMEWORK

Document Details

Document: MOBILE DEVICE POLICY

Document Number: RCL/ISMS/L2/01

Version: 1.0

Document Date: 01-10-2021

Prepared By: CISO

Reviewed By: ISSC

Approved By: CEO

Classification Level: Internal

Modification History

Sl. No. Description of Change Date of Change Version No.

1 Initial Release 01-10-2021 1.0

This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 2 of 7
ISMS FRAMEWORK

1 CONTENTS
1 Contents ........................................................................................................................................................................3
1. Purpose .........................................................................................................................................................................4
2. Scope .............................................................................................................................................................................4
3. Policy .............................................................................................................................................................................4

This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 3 of 7
ISMS FRAMEWORK

1. PURPOSE
This policy outlines the use of mobile devices by employees of RECOM CONSULTING LIMITED. This
policy should be read and understood by all employees who:
• Want to use, or are using, a personal mobile device for work purposes
• Use a company owned mobile device
• Bring a personal mobile device onto company property

2. SCOPE

All mobile devices, whether owned by or owned by employees, inclusive of smartphones and
tablet computers, that have access to corporate networks, data and systems are governed by this
mobile device security policy.

The scope of this policy does not include corporate IT-managed laptops.

Exemptions: Where there is a business need to be exempted from this policy (too costly, too
complex, adversely impacting other business requirements) a risk authorized by security
management must be conducted.

Applications used by employees on their own personal devices which store or access corporate
data, such as cloud storage applications, are also subject to this policy.

3. POLICY
Use of personal mobile devices: Employees may have the opportunity to use their personal
devices for work purposes when authorized in writing, in advance, by the employee and
management. Personal electronic devices include, but are not limited to, personally owned cell
phones, tablets, laptops and computers.

The use of personal devices is limited to certain employees and may be limited based on
technology. Contact the HR department for more details.

Employees who have not received authorization in writing from management and who have not
provided written consent will not be permitted to use personal devices for work purposes. Failure
to follow policies and procedures may result in disciplinary action up to and including termination
of employment.

This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 4 of 7
ISMS FRAMEWORK

Use of company owned mobile devices: Certain employees may be issued a company owned
mobile device. Use of these devices is contingent upon continued employment with RECOM
CONSULTING LIMITED and the device remains the sole property of RECOM CONSULTING
LIMITED. Company provided mobile devices are part of a ‘family plan’ with shared minutes and
include data usage. Excessive use of minutes or bandwidth for non-business activity is discouraged
and may result in a Payroll deduction for personal usage.

Security: Employees must put a PIN, password or other security measures in place on every device
that is used to access company information. Further, employees are required to have mobile
device management (MDM) software installed on their personal mobile devices as recommended
by RECOM CONSULTING LIMITED. This software must be installed by the IT department prior to
using the device for work purposes.

When possible, employees should use two-factor or two-step verification for added
application/device security.

Employees may not use any cloud-based apps or backup that allows company-related data to be
transferred to unsecure parties. Due to security issues, mobile devices may not be synchronized to
other devices in the employee’s home. Making any modifications to the device hardware or
software, or installing additional hardware or software, beyond authorized and routine installation
updates is prohibited unless approved by the IT department. Employees may not use unsecure
Internet sites.

Family and friends should not use personal devices that are used for company purposes.

Employees whose personal devices have camera, video, or recording capability are restricted from
using those functions anywhere in the building or on company property at any time unless
authorized in advance by management.

An employee may not store information from or related to former employment on the company’s
device.

Behavior: While at work, employees are expected to exercise the same discretion in using their
personal devices as is expected for the use of company devices. Company policies pertaining to
harassment, discrimination, retaliation, trade secrets, confidential information and ethics apply to
the use of personal devices for work-related activities.

Excessive personal calls, e-mails, or text messaging during the work day, regardless of the device
used, can interfere with employee productivity and be distracting to others. Employees must
handle personal matters on non-work time and ensure that friends and family members are aware

This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 5 of 7
ISMS FRAMEWORK

of the policy. Exceptions may be made for emergency situations and as approved in advance by
management.

Mobile devices shall be turned off or set to silent or vibrate mode during meetings, conferences,
and in other locations where incoming calls may disrupt normal workflow.

Work Hours: Nonexempt employees may not use their mobile devices for work purposes outside
of their normal work schedule without authorization in advance from management.

This includes but is not limited to reviewing, sending, and responding to e-mails or text messages,
responding to calls or making calls.

Employees may not use their personal devices for work purposes during periods of unpaid leave
without authorization from management. RECOM CONSULTING LIMITED reserves the right to
deactivate the company’s application and access on the employee’s personal device during
periods of unpaid leave.

Privacy: No employee should expect any privacy except that which is governed by law. RECOM
CONSULTING LIMITED has the right, at any time, to monitor and preserve any communications
that utilize RECOM CONSULTING LIMITED’s networks in any way, including data, voicemail,
telephone logs, Internet use, network traffic, etc., to determine proper utilization, regardless of
the ownership status of the device used to access the company’s networks. Management reserves
the right to review, retain, or release personal and company-related data on mobile devices to
government agencies or third parties during an investigation or litigation. Management may
review the activity and analyze usage patterns and may choose to publicize this data to assure
that RECOM CONSULTING LIMITED’s resources in these areas are being utilized according to this
policy. Furthermore, no employee shall knowingly disable any network software or system
identified as a monitoring tool.

Inspection: At any time, the employee may be asked to produce the mobile device for inspection.
The purpose of these inspections is to insure that the employee is following company policy.

Safety: Employees are expected to follow applicable state or federal laws or regulations regarding
the use of electronic devices at all times.

Employees whose job responsibilities include regular or occasional driving are expected to refrain
from using their mobile devices while driving. Regardless of the circumstances, including slow or
stopped traffic, employees are required to pull off to the side of the road and safely stop the
vehicle before placing or accepting a call or texting. The only exception to this stipulation is if the
call can be placed or accepted entirely hands-free. Special care should be taken in situations
where there is traffic, inclement weather, or unfamiliar areas.

This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 6 of 7
ISMS FRAMEWORK

Employees who are charged with traffic violations resulting from the use of mobile devices while
driving will be solely responsible for all liabilities that result from such actions. Employees who
work in hazardous areas must refrain from using mobile devices as doing so can potentially be a
major safety hazard.

Lost, Stolen, Hacked, or Damaged Equipment: Employees are expected to protect mobile devices
used for work-related purposes from loss, damage, or theft. In an effort to secure sensitive
company data, employees are required to have remote wipe software (MDM) installed on their
mobile devices by the IT department prior to using the devices for work purposes. This software
allows all data to be erased remotely in the event the device is lost or stolen. The remote wipe
process will remove all programs and data from the phone and reset it to factory defaults. RECOM
CONSULTING LIMITED will not be responsible for loss or damage of personal applications or data
resulting from the use of company applications or remote wiping. Employees must notify
management immediately in the event their mobile device is lost or stolen.

If the mobile device is damaged, the employee must notify management immediately. The
employee will be responsible for the cost of repair or replacement.

Employees may receive disciplinary action up to and including termination for damage to
company owned mobile devices caused willfully by the employee.

Termination of Employment: Upon resignation or termination of employment, the mobile device


will be reset to factory defaults using the remote wipe software. RECOM CONSULTING LIMITED
will not be responsible for loss or damage of personal applications or data resulting from the
remote wipe

This is an internal document prepared by RECOM CONSULTING LIMITED and it is strictly prohibited to be reproduced, utilization of
disclosure to any third party, in any form, without prior intimation to RECOM CONSULTING LIMITED
Page 7 of 7

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy