TITLE

PLANS INTO ACTION

AUTHOR(S)
Kavanagh, John
PUB. DATE
September 2005
SOURCE
Computer Weekly;9/13/2005, p52
SOURCE TYPE
Trade Publication
DOC. TYPE
Report
ABSTRACT
This article reports that for businesses to run smoothly, there is a need of implementing mobile policies and procedures, and enforcing them. Chris Minchin, manager at the Federation Against Software Theft, says that it is essential that companies implement mobile policies and procedures, and enforce them consistently, so that users understand what they can and cannot do when using company-owned kit. Minchin says policies should ideally cover issues such as who uses a mobile laptop, otherwise family members might download viruses or illegally copied software or music, making the company liable. Policies also need to cover appropriate and inappropriate use. All mobile access should be logged, with enough detail to identify the user, the access time, connection duration and what systems were accessed. The authentication of users should be enforced before they access mobile devices or connect to the network. All information should be scanned for malicious software before it is stored on a mobile device or the corporate network. INSET: Case study: headhunters benefit from a standardised approach.
ACCESSION #
18444217

 

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics