Mobile Device Management
To ensure the security, management, and compliance of mobile devices used within the organization, this guideline outlines the policies and procedures for Mobile Device Management (MDM) via Ozone.
Scope
This guideline applies to all employees, contractors, and third-party users who use mobile devices to access corporate data and systems.
1. Device Enrollment
1.1 Eligible Devices: Only company-approved devices can be enrolled in the MDM system. This includes smartphones, tablets, and laptops.
1.2 Enrollment Process:
Employees must enroll their devices using the provided instructions.
Devices should be enrolled within the first week of issuance or use.
2. Security Policies
2.1 Password Protection:
All devices must be protected with a strong password or biometric authentication.
Passwords must be changed every 90 days.
2.2 Encryption:
All data stored on mobile devices must be encrypted.
Encryption settings will be enforced through the MDM system.
2.3 Remote Wipe:
In case of loss or theft, devices must be reported immediately.
The MDM system will be used to remotely wipe data from lost or stolen devices.
3. Application Management
3.1 Approved Applications:
Only applications approved by the IT department is recommended to be installed on devices.
A list of approved applications will be maintained and updated regularly.
3.2 Application Updates:
Users must install updates for approved applications promptly.
The MDM system may automatically push critical updates.
4. Data Management
4.1 Corporate Data Access:
Access to corporate data will be restricted based on user roles.
Sensitive data must not be stored locally on mobile devices unless necessary.
4.2 Data Backup:
Regular backups of corporate data will be enforced.
Backup settings will be managed through the MDM system.
5. Compliance and Monitoring
5.1 Policy Compliance:
Devices will be regularly audited for compliance with MDM policies.
Non-compliant devices will be restricted from accessing corporate resources.
5.2 Monitoring:
The MDM system will monitor devices for security threats, unauthorized access, and policy violations.
Logs and reports will be reviewed by the IT department regularly.
6. Usage Guidelines
6.1 Personal Use:
Personal use of company-issued devices should be minimized.
Users must not install personal applications that could compromise security.
6.2 Public Networks:
Use of public Wi-Fi networks should be avoided.
7. Responsibilities
7.1 Employee Responsibilities:
Comply with all MDM policies and procedures.
Report any security incidents, loss, or theft of devices immediately.
7.2 IT Department Responsibilities:
Manage and maintain the MDM system.
Provide support and training for employees regarding MDM policies.
8. Consequences of Non-Compliance
Non-compliance with MDM policies may result in restricted access to corporate resources.
Repeated violations can lead to disciplinary action, up to and including termination of employment.
9. Support and Contact Information
For any issues or questions regarding the MDM policies, contact the support team at people@axelerant.com.
Review and Revision
This guideline will be reviewed annually and updated as necessary to ensure it remains effective and relevant to the organization’s needs.