The Mobile Computing Procedure addresses the actions that must be taken by the Company’s personnel who have mobile computing equipment, or who are temporarily using mobile computing equipment.
1.1 PROCEDURE OWNER
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3.1 GENERAL REQUIREMENTS
3.2 SPECIFIC SECURITY REQUIREMENTS
4. ROLES AND RESPONSIBILITIES
4.1 EMPLOYEES (PERSONS USING THE MOBILE COMPUTING EQUIPMENT)
4.3 IT PERSONNEL
4.4 IT SECURITY TEAM
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION
The primary goal of the Incident Management process is to restore normal service operation as quickly as possible and minimize the adverse impact on business operations, thus ensuring that the best possible levels of service quality and availability are maintained.
The objective of the Making Corporate Information Publicly Available Procedure is to determine whether the disclosure of information is appropriate, to prepare information for disclosure and resolve problems with disclosure processes.