In part 2 of this series, Assessing Legal and Regulatory Reuirements, we looked at the two areas critical to creating a Mobile Device Policy; legal requirements and domain ownership. A proper analysis of both of these areas will help protect the organization by setting clear standards for operating mobile devices within the enterprise and establish a chain of responsibility within the organization to ensure that all protocols are followed consistently thereby reducing the likelihood of misunderstanding with respect to employee owned devices used within the workplace. We are now ready to look at Mobile Device Management and the things necessary to ensure success here.
Employee Owned Mobile Device Agreement
This is the last and perhaps most critical part of the process. This agreement sets out exactly what the company is entitled to do with and to the employee owned device. The challenge here is to obtain the required levels of security for corporate data and networks while maintaining privacy and respect for employees.
The Employee Owned Mobile Device Agreement is a simple and straightforward document that includes an acknowledgement and acceptance of the terms of organization’s Mobile Device Policy. By accepting the terms, the employee acknowledges that the organization will have the legal right and ability to secure their device and the data it contains if required.
While this is a simple step it is very important step as the employee is opting into the corporate network, the device management policies and rendering access to their own device which goes a long way toward mitigating risks associate with future claims by the employee that they were somehow unaware of the policy. Employee acceptance will allow the company to delete some or all data on a device, perform scans and other security measures up to and including seizing a device and this signed agreement ensures the company has the right to conduct such security activities.
Mobile Device Management Software
Now that you have permission to carry out the necessary security measures to protect your internal infrastructure and data, you need a toll with which to do so. Enter, MDM: Mobile Device Management. With MDM you can efficiently and effectively carry out the steps necessary to manage employee owned devices and other mobile assets connected to your enterprise.
A good Mobile Device Manager delivers platform flexibility as it manages all mobile device platforms with minimal disruption to the device along with features including role based administration, geo-coding, and remote swipes which allow greater flexibility for IT while being accessed from a single console. Mobile App management including distribution of in-house apps as well as commercial apps, support for user self-service, and support for Apple volume purchase program (if applicable to your organization) alongside secure document distribution and management , enterprise password support, and remediation of non-compliant devices are all necessary for solid mobile device management.