Project Module 4 Deliverable Template_22-REB
pptx
keyboard_arrow_up
School
DeVry University, Chicago *
*We aren’t endorsed by this school
Course
285
Subject
Information Systems
Date
Feb 20, 2024
Type
pptx
Pages
6
Uploaded by ChancellorFang10858
SEC285
Module 4
Bring Your Own Device (BYOD) Security Policy
Rubric
Activity
Requirement(s)
Points
BYOD Security Policy
The complete policy template
60
1.
Overview: As you may know, smart devices are becoming more and more predominant in the workplace. These devices can open new threats to our organization, and we are here to lessen those threats with policy.
2. Purpose: We aim to minimize all security threats to the organization. By identifying devices that have extra vulnerabilities, so that we can reduce the risk. Such threats need to be located, assessed, and dealt with before any information can be accessed. The loss of information is detrimental to this organization and the confidence our customers have in us.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
3. Scope: A mobile device management and mobile application management tools help manage device remotely by an organization as well as provide authorized content and accessibility to certain data users. Content management and Mobile content management are tuned to provide management for many devices as well as editing and modifications of digital content by multiple employees.
4. Policy: Devices must be authenticated without any tampering of software; the mobile device management tool will manage the device discrepancies. To help IT departments with the management of devices the assigning of similar OS will help achieve up o date updates to all user devices.
5. Policy Compliance: Due to the number of vulnerabilities of an organization keeping a tight management system to help avoid any open doors for security risk it is of high of importance to an organizations infrastructure. Employees should refrain from using unauthorized devices or software due to the high risk for security implications. Employee found to have violated this policy may be subject to disciplinary actions up to and including termination of employment.
6. Related Standards, Policies, and Processes: The General Data Protection Regulation (GDPR) was presented by the European Union to help balance personal data and protect regulations. It is a comprehensive and clear set of guidelines that acknowledges that different "flavors" of personal data require different levels of protection. Sensitive data, such as health, biometrics, genetic, or criminal history are considered the highest levels of protection. Companies that regularly collect and process large volumes of personal data must register with the government-appointed Data Protection Authorities to have legal authorization.
7. Definitions and Terms:
BYOD: Bring Your Own Device
Mobile Devices : Portable electronic equipment that can connect to the internet.
OS: Operating System
GDPR: General Data Protection Regulation is a privacy regulation.
Mobile device management: A tool that sees the overall performance and device health.
Mobile application management: A software that secures and enables IT controls of applications and end users.
Content management: The process for collection, delivery, retrieval, governance and overall management of information in any format.
Mobile content management: Software that enables content to be easily and securely shared from any device in a specific enterprise.
Vulnerabilities: Weakness or error in a system or device’s code, that when exploited can compromise the confidentiality, availability, and integrity of data. 8. Revision History: Date of change
Responsible
Summary of change
August 2019
SANS policy team
Updated and converted to new format
March 2023
Rashaad Bradley
SANS Security policy template
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help