Mobile Computing Procedure

Mobile Computing Procedure

The Mobile Computing Procedure addresses the actions that must be taken by the Company’s personnel who have mobile computing equipment, or who are temporarily using mobile computing equipment.

CONTENT

1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
3.1 GENERAL REQUIREMENTS
3.2 SPECIFIC SECURITY REQUIREMENTS
4. ROLES AND RESPONSIBILITIES
4.1 EMPLOYEES (PERSONS USING THE MOBILE COMPUTING EQUIPMENT)
4.2 MANAGERS
4.3 IT PERSONNEL
4.4 IT SECURITY TEAM
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION

Pages: 10

Review Mobile Computing Procedure.

Your email address will not be published. Required fields are marked *

Related Products:

€1,719.99

Purchase

This bundle contains all the products listed in the Data Governance section. Take advantage of the 25% OFF when buying the bundle!

€79.99

Purchase

The objective of the Cryptographic Controls Standard is to outline the minimum information security controls which must be applied when cryptographic services and solutions are utilized by the Company. Specifically, this Standard focuses on key management requirements, acceptable algorithms, appropriate key lengths, and raises pertinent regulatory considerations relating to the use of cryptography.

€49.99

Purchase

The objective of the Making Corporate Information Publicly Available Procedure is to determine whether the disclosure of information is appropriate, to prepare information for disclosure and resolve problems with disclosure processes.

Get  Your Free Sample

Please use the form below to subscribe to our list and receive a free procedure template!
GET YOUR FREE TEMPLATE
>
close-link