Policies Covering Mobile Phones

Size: px
Start display at page:

Download "Policies Covering Mobile Phones"

Transcription

1 Policies Covering Mobile Phones MAPI Council Survey January 2012 No. 215 By: Don Norman Council Director and Economist Assisted By: Jun Lee Research Associate Manufacturers Alliance for Productivity and Innovation 1600 Wilson Blvd, Ste 1100, Arlington, VA T mapi.net

2 Policies Covering Mobile Phones MAPI Council Survey January 2012 No. 215 By: Don Norman, Council Director and Economist The results of the survey on policies covering mobile phones are summarized below. QUESTION 1 Does your company have a formal mobile phone policy? Yes No QUESTION 2 If your company has a formal mobile phone policy, what areas does it cover? (Check all that apply) Frequency (Based on 58 Responses) Reimbursement for expenses Phone Selection Personal Use Security Other Other: Everyone is provided Company Blackberry's. Legal (Hands Free) - Reimbursement for damage - Use cannot conflict with any Company Policy Mandatory use of hands free devices is required in automobiles. Security software must be installed on personal phones (and tablets) that are configured to receive . Standard phone and minutes plan. Employee can purchase a "nicer" phone if desired but has to pay. Downloading/Applications. Policy dictates how often you can get a new company paid device. Preferred Carriers & Services Covered. Mobile phone use covered in travel policies related to talking while driving. QUESTION 3 Comments or elaboration on your company s mobile phone policy? Some policies are global where others are regional. We are formalizing a policy currently to roll out to our associate population. Phone options and available plans and services are set by company policy with no option for the user to make changes. Provide Blackberry's for business use. Limited to the level of the person as to what type of phone received

3 My answers are based on what we do for employee s who are issued a company phone. Long term agreements are established at the corporate level and cover phone model offering, domestic and international calling plans. Phone security is also covered by our corporate IT group. 1.) Type of device that can be used. 2.) Identification of people who will be supplied a company phone 3. Identification of people who will get reimbursed for company pone use. The policy outlines when an employee is eligible for a company phone. All phones are company issue under global agreements with service providers. Recently updated to be more comprehensive. Company pays minutes and standard phone. Nicer phones paid for by employee but they own the phone. Use is intended for company business, some personal use that does not cost $$ and does not interfere with business is allowed. Phones and phone services are selected and managed centrally. We offer two carriers, ATT and Verizon. Moving away from BlackBerry to iphones; BU's determine who is eligible; annual review of expenses at corporate. Policy covers who is eligible for a company paid phone, and policies around that company paid phone. If you choose to use your personal phone for company activity, certain rules also apply, and you are eligible for reimbursement. Our company policy also includes an eligibility matrix, recommended providers and guidelines for business use of personal devices. We allow many employees who travel to have a company-issued phone. Expenses are paid by the company BUT we ask employees to pay a modest co-pay to use the device as their personal phone as well. We provide employees a monthly mobile phone allowance (either $50 or $100 per month). This is to cover the business portion of their mobile phones. They can use any plan and get any phone they like as the phones are personal. No bills are submitted and the only thing we control is if the employee is eligible for the mobile phone allowance. If an employee wants a smart phone hooked up to the company's computer system, we restrict the type of phone, how they hook into the company computers and how company data is available and secured. With respect to question 4, while all costs are paid, policy indicates that it is expected that personal use be limited. We have been recently discussing this issue and are seriously considering the elimination of mobile phone expense reimbursement. a. Hands free usage when in car B. if employee wants on personal phone C. employee must use Airwatch d. device must be password protected e. covers tablets also Blackberries provided at certain levels in the company. Below those levels, reimbursement of personal phone usage occurs on a case-by-case basis. We manage this pretty tightly and don't allow personal usage of company devices. Company does not pay for hardware. Employee is responsible to purchase phone and service. Company will reimburse for required communication cost. Totally decentralized, some businesses tightly regulate use, others are like zoning in Houston. Code of business conduct covers how mobile devices are to be used/protected. Employees can elect away from the company supported BlackBerry for an iphone but only the BlackBerry will be supported. If you want an iphone, you are responsible for managing updates. Only Company owned devices may connect to the system. Focus is on non-use or, at best, hands-free use of a mobile phone while driving a car for company business.

4 QUESTION 4 How would you characterize your company s coverage of mobile phone expenses? All mobile phone costs are paid directly by the company Employees are fully reimbursed for their mobile phone expenses Employees are partially reimbursed for their mobile phone expenses Employees are not reimbursed for mobile phone expenses QUESTION 5 If mobile phone expenses are partially covered by your company, what qualifies for reimbursement? (Check all that apply) Frequency (Based on 19 Responses) The cost of the phone All monthly phone charges business and personal Monthly phone charges for business related calls and 57.9 text messages only 11 Data plans (e.g., the monthly charge for Internet access on smart phones) Based on 19 responses Comments or Clarifications? Within our company, current practice is "management discretion." This means, effectively, the reimbursement policies are unevenly applied. Company pays for 100 text messages a month We are issued with blackberries. Max $100/month cost reimbursement (unless actual bill is less) for voice, text and data. $100 for a new handset every three years. Full reimbursement only for approved devices for approved employees (eligibility matrix). Basically our policy is we provide a "stipend" for business use of a personal mobile phone. The company doesn't really care how much, or how little is spent by the employee on their phone and/or phone plan as these are all personal expenses to the employee. Employees at a certain level receive a company blackberry. Others are able to claim incremental business expense portion on their expense reports. The Company pays 100%, sometimes through the company program and sometimes via expense report. Employees must justify to use programs outside the Company We are moving toward a policy in which those who are identified as requiring a phone will get a specified monthly allowance in their paycheck (grossed up for taxes) to purchase whatever phone services they require.

5 QUESTION 6 Does your company specify the mobile phone that employees must use? Yes No QUESTION 7 If employees can choose the mobile phone they use, are there any restrictions on that choice? Yes No QUESTION 8 How do you maintain data security/integrity on your mobile devices? Handled by IT (6 companies) Combination of factors including encryption and password protection. (16 companies) Goes through the company server. Security maintained the same as laptops, etc. Limited devices where security is sound. Enterprise servers for . Airwatch software. (2 companies) Software that wipes the phone when stolen. (4 companies) List of approved operating systems and use of MDM tool. Software tools that detects malware and shuts down the phone. At the network level (2 companies) Company owned devices required This is a new, hot topic for our IT department. Policies are currently being developed. No formal policy. QUESTION 9 Does your company utilize mobile device management solutions? Yes No

6 QUESTION 10 If your company utilizes mobile device management solutions, what service or solution does it use? Airwatch (3 companies) Blackberry (3 companies) BES/Afaria Cellution Embedded into Blackberry or Good MDM is in pilot phase. We are considering Mobile Iron. We do have a BES (Blackberry Enterprise Server) Mind Wireless (2 companies) Mobile Iron (3 companies) Remote disabling for IPhones Tangoe Verizon Wireless Business Connection (2 companies)

Mobile Device Management

Mobile Device Management Mobile Device Management Real World Lessons Jim Darrow Ilitch Holdings, Inc. Ilitch Holdings, Inc / Ilitch Companies Just you basic Mom and Pop Business Provide Shared services and consulting Technical

More information

C.R. Bard Mobile Device Guidelines Clarifying Bard s mobile device service

C.R. Bard Mobile Device Guidelines Clarifying Bard s mobile device service 1 C.R. Bard Mobile Device Guidelines Clarifying Bard s mobile device service A guide for employees to understand Bard s mobile device policy and service Ref: UserGuide C.R. BARD 3/17/2014 Bard Mobile Device

More information

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy Converting a Device Whose phones will be wiped on Wednesday, January 30? If you continue to have a company-paid phone, you are

More information

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees

More information

Guidelines for the Purchase and Use of Mobile Phones at UWA

Guidelines for the Purchase and Use of Mobile Phones at UWA Guidelines for the Purchase and Use of Mobile Phones at UWA Mobile phones are an integral part of business in today s society. The University recognises this and provides for mobile phones to be purchased

More information

Information Services Cellular Phone Policy

Information Services Cellular Phone Policy Information Services Cellular Phone Policy Policy Basis/Background This policy outlines the eligibility of Information Services employees whose positions require remote communications through the use of

More information

CELL PHONE ACCESS AND USAGE

CELL PHONE ACCESS AND USAGE Administrative Procedure 142 CELL PHONE ACCESS AND USAGE Background The Division understands the need for employees to access various forms of communication devices for both internal and external communication

More information

Mobile Device Security Is there an app for that?

Mobile Device Security Is there an app for that? Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach

More information

Cell Phones and Other Hand-held Communication Devices Home Internet Connection Policies and Procedures March 1, 2012

Cell Phones and Other Hand-held Communication Devices Home Internet Connection Policies and Procedures March 1, 2012 Cell Phones and Other Hand-held Communication Devices Home Internet Connection Policies and Procedures March 1, 2012 INDEX I. Purpose 1. II. Policy 1. A. Current Employees who Require a Cell Phone Including

More information

Fit for Future Back Office. Project Board Meeting 18 May 2012 Agenda Item 2.1. Mobile Device Strategy

Fit for Future Back Office. Project Board Meeting 18 May 2012 Agenda Item 2.1. Mobile Device Strategy Fit for Future Back Office Project Board Meeting 18 May 2012 Agenda Item 2.1 Mobile Device Strategy 1 Purpose 1.1 The purpose of this report is to; present for discussion and approval the proposed key

More information

STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES PO Box 45811, Olympia WA 98504-5811

STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES PO Box 45811, Olympia WA 98504-5811 STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES PO Box 45811, Olympia WA 98504-5811 DATE: March 2, 2015 TO: FROM: SUBJECT: RFP# 1556-535 Bidders Q+A Sarah MacLean, RFP Coordinator DSHS Central

More information

Connect With My Team. in real time RELIABLEFAST FAST M SPEED TEAMCONNECT SURF. Know How Guide to Mobile Device Management PEACE OF MIND SPEED NEW

Connect With My Team. in real time RELIABLEFAST FAST M SPEED TEAMCONNECT SURF. Know How Guide to Mobile Device Management PEACE OF MIND SPEED NEW Connect With My Team in real time Know How Guide to Mobile Device Management READY CONNECT accessreliableshare M ON SECURE SMAR T IND TOOLSNEXT SOLUTION READY Know How Guide to Mobile Device Management...

More information

Kaspersky Lab PR Survey 2013 Report Netherlands_V1.0. TNS Infratest

Kaspersky Lab PR Survey 2013 Report Netherlands_V1.0. TNS Infratest Kaspersky Lab PR Survey 2013 Report Netherlands_V1.0 Contents 1 Summary 03 2 Survey Information 06 3 Loss of Equipment 10 4 Data Security & Encryption 15 5 Policies & Employment 21 2 1 Summary Summary

More information

[BRING YOUR OWN DEVICE POLICY]

[BRING YOUR OWN DEVICE POLICY] 2013 Orb Data Simon Barnes [BRING YOUR OWN DEVICE POLICY] This document specifies a sample BYOD policy for use with the Orb Data SaaS MDM service Contents 1 ACCEPTABLE USE... 3 1.1 GENERAL RULES... 3 2

More information

Official Policies and Procedures of the Utah State Office of Education and Utah State Office of Rehabilitation. Page: 1 of 5

Official Policies and Procedures of the Utah State Office of Education and Utah State Office of Rehabilitation. Page: 1 of 5 Official Policies and Procedures of the Utah State Office of Education and Utah State Office of Rehabilitation Effective 10/06/10 Revision 9/01/13 Page: 1 of 5 Subject: Issuance, Accountability and Cost

More information

BLACKBERRY INTERNET SERVICE (BIS), BLACKBERRY ENTERPRISE SERVER (BES) INITIAL SETUP AND ACTIVATION IN THE UNIVERSITY OF HOUSTON ENVIRONMENT

BLACKBERRY INTERNET SERVICE (BIS), BLACKBERRY ENTERPRISE SERVER (BES) INITIAL SETUP AND ACTIVATION IN THE UNIVERSITY OF HOUSTON ENVIRONMENT BLACKBERRY INTERNET SERVICE (BIS), BLACKBERRY ENTERPRISE SERVER (BES) INITIAL SETUP AND ACTIVATION IN THE UNIVERSITY OF HOUSTON ENVIRONMENT PRE-BUYING RECOMMENDATIONS Before buying a BlackBerry device,

More information

AirWatch Pricing EUR. Effective May 15 th, 2013 Expires September 30 th, 2013

AirWatch Pricing EUR. Effective May 15 th, 2013 Expires September 30 th, 2013 AirWatch Pricing EUR Effective May 15 th, 2013 Expires September 30 th, 2013 Included Included Mobile Device Management Mobile Device Management (MDM) Manage corporate or employee-owned devices, configure

More information

BYOD Policy for [AGENCY]

BYOD Policy for [AGENCY] BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein

More information

Division of Information Technology Lehman College CUNY

Division of Information Technology Lehman College CUNY Division of Information Technology Lehman College CUNY Using Lehman s Secure Outgoing (SMTP) Server Updated April 16, 2013 Are you able to receive your Lehman email on your smart phone, laptop or tablet

More information

Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc.

Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc. Managing Mobile: BYOD, MDM, MAM, and more acronyms John H Sawyer Senior Security Analyst InGuardians, Inc. Who Am I? InGuardians Senior Security Analyst Penetration Testing Web, Network, Smart Grid, Mobile,

More information

Bring Your Own Device. Individual Liable User Policy Considerations

Bring Your Own Device. Individual Liable User Policy Considerations Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations

More information

BYOD Nightmare. Perfect Storm of Mobile Devices and Application in Hospitals

BYOD Nightmare. Perfect Storm of Mobile Devices and Application in Hospitals BYOD Nightmare Perfect Storm of Mobile Devices and Application in Hospitals Neha Patel, MD MS Director of Mobile Strategy and Applications Director of Quality, Section of Hospital Medicine University of

More information

The Future of Mobile Device Management

The Future of Mobile Device Management The Future of Mobile Device Management Simplifying the move from BlackBerry to a multi-os environment MobileIron Advisory Services 415 E. Middlefield Road Mountain View, CA 94043 www.mobileiron.com Table

More information

Mobile Device Policy Frequently Asked Questions

Mobile Device Policy Frequently Asked Questions Mobile Device Policy Frequently Asked Questions Last updated: November 30, 2012 1. I have read the policy but can you summarize the three options available to employees who have mobile communications needs?

More information

Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices

Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices Results of 3rd Annual Survey of IT Pros on Managing Mobile Devices Survey Results and Q&A 18-December-2013 Ryan Faas Journalist and Consultant T. Reid Lewis President Enterprise Device Alliance Presenters

More information

UAMS Cell Phone Changes

UAMS Cell Phone Changes UAMS Cell Phone Changes When Ordering - Effective April 18 th When Billing - End of June What Cell phones, aircards and ipads w/3g service (not foundation funded devices) What All phones stay with current

More information

PDA/Cell Phone Research

PDA/Cell Phone Research PDA/Cell Phone Research Institution Allowance Allowance 2 Notes OUS, OIT, WOU PSU, SOU EOU $40 Cell Phone $25 Smart Phone $20 Internet Svc OUS only Smart phone allowance is in addition to cell phone up

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

Corporate Mobile Policy Template

Corporate Mobile Policy Template Updated July 2011 Three major changes have occurred over the past 18 months that require updates to your organization s mobile policy. These changes include widespread adoption of tablet devices, changes

More information

11 Best Practices for Mobile Device Management (MDM)

11 Best Practices for Mobile Device Management (MDM) MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.

More information

BYOD: What s Your Strategy?

BYOD: What s Your Strategy? : What s Your Strategy? Eric Panknin IT Manager epanknin@dmj.com What is BYOD? Building a Strategy Policy Considerations Mobile Security Solution Implementation and Training Maintain Discussion and Experiences?

More information

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology

Policy Checklist. Directorate of Performance and Reform. Stephen Hylands, Head of Information Technology Policy Checklist Name of Policy: Purpose of Policy: Directorate responsible for Policy Name & Title of Author: Does this meet criteria of a Policy? Trade Union consultation? Equality Screened by: Date

More information

How Do I Log Into Mobile Banking?

How Do I Log Into Mobile Banking? 1 How Do I Log Into Mobile Banking? In order to use any of Connex Mobile Banking service, you must register for Online Banking via a computer and browser. This is necessary to set-up all security settings

More information

HOWARD UNIVERSITY POLICY

HOWARD UNIVERSITY POLICY HOWARD UNIVERSITY POLICY Policy Number: Series 700: Information and Technology Policy Title: 700-004 MOBILE DEVICE STIPEND POLICY Responsible Officer: Chief Operating Officer Delegated to: Chief Information

More information

BRING YOUR OWN DEVICE POLICY (BYOD)

BRING YOUR OWN DEVICE POLICY (BYOD) BRING YOUR OWN DEVICE POLICY (BYOD) APPROVED BY: South Gloucestershire Clinical Commissioning Group Quality and Governance Committee DATE August 2015 Date of Issue: August 2015 Version No: 7 Review due:

More information

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD

More information

Southwest Airlines 2013 Terms of Use Portable Devices Feb 2013

Southwest Airlines 2013 Terms of Use Portable Devices Feb 2013 1 TERMS OF USE As of February 3, 2013 The following terms and conditions of use ( Terms of Use ) form a legally binding agreement between you (an entity or person) and Southwest Airlines Co. ( Southwest

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization

More information

BYOD STRATEGIES: THE COST BYOD. The. Can BYOD. decrease. mobility costs?

BYOD STRATEGIES: THE COST BYOD. The. Can BYOD. decrease. mobility costs? BYOD STRATEGIES: THE COST I M P L I C AT I O N S O F BYOD The Can BYOD decrease mobility costs? Introducing BYOD BYOD offers the potential for employers to increase both productivity and employee satisfaction

More information

BYOD: Bring Your Own Device Advantage, Liability or Both?

BYOD: Bring Your Own Device Advantage, Liability or Both? BYOD: Bring Your Own Device Advantage, Liability or Both? S S Scott Summers Laura B. Grubbs Dinsmore & Shohl Louisville, KY The BYOD to Work Movement Dual-Use Devices: used for both personal and company

More information

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology

Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology

More information

J David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com)

J David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com) MDM Solutions Strengths, Weaknesses, Obstacles, Solutions J David Hester (david.hester@lcgsystems.com), Randy Saeks (rsaeks@gmail.com) & Han Su Kim (hkim823@gmail.com) Nick McSpadden (nick.mcspadden@sacredsf.org)

More information

Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success

Btech IT SECURITY SERVICES. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Fiberlink, MaaS360, associated logos, and the names of the products and services of Fiberlink are marks, brands, logos, and symbols may be trademarks or

More information

BYOD BEST PRACTICES GUIDE

BYOD BEST PRACTICES GUIDE BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create

More information

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES APPLE & BUSINESS ios ENTERPRISE SECURITY Apple have had an uphill battle getting into businesses for many years the Windows monopoly Phones provided another attempt Blackberrys and Windows Mobile were

More information

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines

Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines Wrapping Your Arms Around Mobile Security in the Enterprise Nathan King, Senior Manager, IT Security Systems United Airlines May 2013 Choosing a Mobile Device Had to pass FAA Device Security Hardware

More information

IS BYOD (BRING YOUR OWN DEVICE) PART OF YOUR COMPANY S FIELD SERVICE AUTOMATION PLAN?

IS BYOD (BRING YOUR OWN DEVICE) PART OF YOUR COMPANY S FIELD SERVICE AUTOMATION PLAN? WHITE PAPER IS BYOD (BRING YOUR OWN DEVICE) PART OF YOUR COMPANY S FIELD SERVICE AUTOMATION PLAN? INTRODUCTION A recent study by Ericsson projects that there will be 5.6 billion smartphones (or 60 percent

More information

Changes are effective July 1, 2013

Changes are effective July 1, 2013 Wireless Plan 1 Reasons for Change Company is growing and our processes need to evolve We need clearer, more consistent practices across groups Associates need tools to do their jobs We can make reimbursement

More information

Email Regulations. MAPI Council Survey March 2014. By: Bret Kelly Council Director bkelly@mapi.net

Email Regulations. MAPI Council Survey March 2014. By: Bret Kelly Council Director bkelly@mapi.net Email Regulations MAPI Council Survey March 2014 By: Bret Kelly Council Director bkelly@mapi.net Julia Edmonds Economic Research Analyst jedmonds@mapi.net Manufacturers Alliance for Productivity and Innovation

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Cloud Hosting Option For New OnSite Customers

Cloud Hosting Option For New OnSite Customers Cloud Hosting Option For New OnSite Customers 1655 Palm Beach Lakes Blvd. Ste 708 West Palm Beach, FL 33401 Ph: 561-491-6000 Fx: 877-491-5860 Published: 10/29/14 Introduction To Cloud Hosting? In the past

More information

Monitoring and control of users in open environments on the Android platform

Monitoring and control of users in open environments on the Android platform Monitoring and control of users in open environments on the Android platform DEGREE IN COMMUNICATIONS SYSTEMS ENGINEERING AUTHOR: TUTOR: Eric Bella Pulgarín Raúl Sánchez Reillo DIRECTOR: Aitor Mendaza

More information

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent

More information

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses October 2014 A Pilot Survey to Compile Cybersecurity Information In July 2014, the Ohio Division of Securities participated

More information

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus. Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Enterprise Mobility as a Service

Enterprise Mobility as a Service Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Mobile Device Management

Mobile Device Management Vodafone Global Enterprise Mobile Device Management Technical paper Vodafone Global Enterprise Introduction Managing for the future Secure control over your mobile data, devices and applications. The multi-national

More information

A guide to enterprise mobile device management.

A guide to enterprise mobile device management. WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an

More information

Mobile Device. Management-

Mobile Device. Management- Mobile Device Management- What to Know, What to Do Michael F. Finneran Principal, dbrn Associates, Inc. mfinneran@dbrnassociates.com Mobile Policy Development What you really need is a mobility plan- possibly

More information

M&A Banking Research. Mobile Device Management Market Update

M&A Banking Research. Mobile Device Management Market Update M&A Banking Research August 2013 Edited by Kirk Bloede Mobile Device Management Market Update Key Takeaways Mobile Device Management (MDM) is emerging as a top priority in the enterprise market as highly

More information

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere

More information

Insert Partner logo here. Financial Mobility Balancing Security and Success

Insert Partner logo here. Financial Mobility Balancing Security and Success Financial Mobility Balancing Security and Success Copyright 2012 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink.

More information

M O B I L E C O L L A B O R A T I O N S O L U T I O N S

M O B I L E C O L L A B O R A T I O N S O L U T I O N S BUREAU OF ENTERPRISE SYSTEMS AND TECHNOLOGY ENTERPRISE SERVICE DESCRIPTION FOR UNIFIED COMMUNICATIONS M O B I L E C O L L A B O R A T I O N S O L U T I O N S January 2015 V2.00 D E P A R T M E N T O F

More information

MAM + MDM = BMS. (Bada$$ Mobile Strategy)

MAM + MDM = BMS. (Bada$$ Mobile Strategy) MAM + MDM = BMS (Bada$$ Mobile Strategy) Table of Contents 3 Introduction 4 What is Mobile Device Management? 5 What is Mobile Application Management? 6 Why Should You Use Both MDM and MAM? 7 MAM Lifecycle

More information

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management

Appendix 1b. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA. Review of Mobile Portable Devices Management Appendix 1b DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA Review of Mobile Portable Devices Management DISTRIBUTION LIST Audit Team David Esling, Head of Audit and Assurance

More information

Business Wireless Providers That Reduce Costs, Improve Mobile Management, And Enhance Security

Business Wireless Providers That Reduce Costs, Improve Mobile Management, And Enhance Security Business Wireless Providers That Reduce Costs, Improve Mobile Management, And Enhance Security An Opportunity To Revolutionize Business Wireless Systems Significant cost savings, enhanced security, streamlined

More information

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity

More information

The Maximum Security Marriage:

The Maximum Security Marriage: The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according

More information

device management solutions

device management solutions device management solutions devicemanagement Do you have a high number of geographically dispersed remote or field workers who use mobile devices? Do you need to monitor and track the devices and upload

More information

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012 BYOD and Mobile Device Security Shirley Erp, CISSP CISA November 28, 2012 Session is currently being recorded, and will be available on our website at http://www.utsystem.edu/compliance/swcacademy.html.

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

Bring Your Own Device Mobile Security

Bring Your Own Device Mobile Security Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Mobility at Northwestern

Mobility at Northwestern NUIT Tech Talk Mobility at Northwestern February 16, 2010 Matt Gruhn Distributed Support Specialist Today s Agenda Popular Mobile Devices iphone/ipod Touch BlackBerry Android Devices Tablets, Netbooks,

More information

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting

More information

Ken Delaney Technology and Management Directions for Smartphones and Tablets

Ken Delaney Technology and Management Directions for Smartphones and Tablets Gartner Webinar 4/7/11 Ken Delaney Technology and Management Directions for Smartphones and Tablets Attempts by businesses to ban, discourage and control the use of these devices have been unenforceable.

More information

Rose Business Technologies

Rose Business Technologies Mobile Technology Rose Mobile Technology professionals can help mobilize the enterprise by extending core data, business processes, applications and services with proven enterprise mobility solutions.

More information

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü

More information

Workplace-as-a-Service BYOD Management

Workplace-as-a-Service BYOD Management For companies with people in them Workplace-as-a-Service BYOD Management Solution Overview The BYOD Management solution provides customers with IT tools and services to deploy a Workplace-as-a-Service

More information

SANS Mobility/BYOD Security Survey

SANS Mobility/BYOD Security Survey Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey

More information

2) Switch to a personal phone and follow the guidance/procedures established by the University for the Communication Technology Allowance.

2) Switch to a personal phone and follow the guidance/procedures established by the University for the Communication Technology Allowance. MEMO To: Extension Fiscal Staff From: Extension Fiscal Office Date: November 12, 2010 Re: Cell Phone Policy There have been many questions lately regarding the use of University owned cell phones for personal

More information

MINNESOTA STATE STANDARD

MINNESOTA STATE STANDARD Version: 1.00 Approved Date: 4/29/2011 Approval: Signature on file MINNESOTA STATE STANDARD From the Office of Carolyn Parnell Chief Information Officer, State of Minnesota Enterprise Security Portable

More information

Tangoe, Inc. Acquires Anomalous Networks

Tangoe, Inc. Acquires Anomalous Networks Tangoe, Inc. Acquires Anomalous Networks Enhances real-time expense management offering with bill shock prevention and extends partner distribution channels Orange, Conn., January 10, 2012 Tangoe, Inc.

More information

Country Club Bank- Mobile Banking FAQs

Country Club Bank- Mobile Banking FAQs Country Club Bank- Mobile Banking FAQs GENERAL... 2 MOBILE BANKING- WHAT IS IT?... 2 TEXT BANKING... 3 PHONE ENROLLMENT... 4 MOBILE BILLPAY... 5 TROUBLESHOOTING... 6 General How much does this service

More information

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps

SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps September 9 11, 2013 Anaheim, California SAP BPC Forecasting: Anywhere, Anytime with Mobile Apps Susan Beyer NTT DATA, Inc. Agenda What is the whole buzz about Mobility? How to expand your BPC footprint

More information

Device Independence - BYOD -

Device Independence - BYOD - Charting Our Future Device Independence - BYOD - BYOD: Bring your own device to work day What is BYOD? BYOD (Bring Your Own Device) As distinguished from BYOC (Bring Your Own Computer); or BYOT (Bring

More information

BYOD and Mobile Device Management

BYOD and Mobile Device Management April 25, 2013 BYOD and Mobile Device Management Scott Bream Office of the CIO scott.bream@ofm.wa.gov Topics to be covered What is Bring Your Own Device?(BYOD) What is Mobile Device Management?(MDM) Policy

More information

2011 NATIONAL SMALL BUSINESS STUDY

2011 NATIONAL SMALL BUSINESS STUDY 2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout

More information

How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1

How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1 How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1 How Do I Set Up My Office 365 Account On An iphone, ipad or ipod Touch?... 3 How Do I Remove My Office 365 Account From A

More information

Yellow Medicine County Board of Commissioners Policy Manual. Policy Statement. Cell/Smart Phone Policy 702

Yellow Medicine County Board of Commissioners Policy Manual. Policy Statement. Cell/Smart Phone Policy 702 Yellow Medicine County Board of Commissioners Policy Manual Policy Statement TITLE CODE Cell/Smart Phone Policy 702 REFERENCE NA PERSONNEL RESPONSIBLE County Employees, Elected Officials EFFECTIVE 8-26-08

More information

Washwood Heath Academy Use by staff of private communication devices policy

Washwood Heath Academy Use by staff of private communication devices policy As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of

More information

Windows Phone 8.1 in the Enterprise

Windows Phone 8.1 in the Enterprise Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 info@mobileiron.com Introduction 3 Why Windows

More information

Mobile Application Management

Mobile Application Management Kony Write Once, Run Everywhere Mobile Technology WHITE PAPER July 2012 Meeting the BYOD challenge with next-generation application and device management Overview... 3 The Challenge... 4 MAM Functions...

More information

UNIVERSITY OF NEBRASKA - LINCOLN CELLULAR PHONE USEAGE FAQ

UNIVERSITY OF NEBRASKA - LINCOLN CELLULAR PHONE USEAGE FAQ UNIVERSITY OF NEBRASKA - LINCOLN CELLULAR PHONE USEAGE FAQ Why has this policy changed? The Department of the Treasury, through its Internal Revenue Service, issued new guidelines that clarified the taxability

More information

Massachusetts College of Art and Design Mobile Phone Stipend Policy, 2010

Massachusetts College of Art and Design Mobile Phone Stipend Policy, 2010 Massachusetts College of Art and Design Mobile Phone Stipend Policy, 2010 Purpose Cellular telephones and cellular-based wireless communications devices can be an effective resource for campus employees

More information

Mobile Communications Program. May 30, 2013

Mobile Communications Program. May 30, 2013 Mobile Communications Program May 30, 2013 Overview Background Financial Aspects Operational Aspects Discussion and Questions Background April 1 st, 2013 Verizon named the official cell phone provider

More information

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment

BYOD and Its Impact on IT. Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment BYOD and Its Impact on IT Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment BYOD and IT D means Apple products Macs iphones ipads Android phones IT means Microsoft

More information