GROUP INFORMATION TECHNOLOGY DEPARTMENT
Corporate Mobile Devices
Policy
Policy Reference [GITD_IT26]
[Final Version 1.0 | Released Date: June 12, 2018]
Table of Contents
DOCUMENT VERSION & CHANGE CONTROL
6.0 Personnel with Responsibility
THIS PAGE IS INTENTIONALLY
LEFT BLANK
Version History
Issue Date |
Version |
Description |
Prepared By |
Approved By |
June 12,2020 |
1.0 |
Corporate Mobile Device Policy |
Mrs. Sudha Jacob ITIL Administrator |
Mr. Winston Ellison Group CIO |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Change History
Issue Date |
Version |
Description |
Prepared By |
Approved By |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This Policy aims to
ensure that best practices for mobile computing are followed, without affecting
the Babtain business.
Portable computers
allow personnel to be more productive while "on the road". They offer
flexibility as to where one can access information. From the security point of
view they can create risks of information disclosure, theft and perhaps offer
an unauthorized point of access to the corporate network. The computing
population is on the increase, so a special policy is necessary. When using
mobile computing the risks of working in an unprotected environment should be
considered and appropriate protection applied.
·
All Babtain supplied
mobile devices and their contents remain the property of Babtain.
1.
Are responsible for backing up of Babtain
business data that is stored on the mobile computer on a regular basis.
2.
Use antivirus and personal firewall software
when connected to any network other than Babtain.
3.
Ensure that unauthorized or unlicensed software
is not installed
4.
Review distribution lists of authorized
recipients at regular intervals.
5.
The Group IT department configures
software/hardware security measures on all Babtain mobile devices. Security
measures as put in place by Group IT are not altered or removed
·
If the laptop is
running Windows operating systems, the automatic update options shall be
activated within Windows update, to ensure that the system is kept current with
available security patches
·
The operating system
and application patch levels must be consistent with the current patch levels
of our organization for similar devices and operating systems
1.
Classified data is not transmitted across
insecure networks (such as Internet, Mobile-GSM, Infrared, etc.) unless
encrypted.
2.
Dial-in or VPN access to the Babtain network is authorized
by the Group IT.
·
Please ensure that your
devices are configured as below:
Approved Device |
Security Requirement |
Mobile Phone
|
PIN, locked whilst not in use. |
Laptop |
Password Protected, AV Installed |
·
Mobile computers
entering the network shall meet the following requirements.
1. If the computer is
owned by Babtain then the following checks shall be performed.
a) Determine whether the
anti-virus program is up to date, has the latest virus definitions, is
configured properly, and is running properly. If it fails one of these
conditions or has not been scanned for a virus within the last week, a full
virus scan must be done before the computer can be used on the network.
b) Test the computer and
scan for additional malware such as adware or spyware test to determine whether
the computer has a worm.
c) Quarantine & Remove
any malware on the computer if any was detected. Log information about any malware
found.
2. If the computer is
owned by an outside organization the following must be done.
a) A full virus scan must
be done.
b) Test the computer and
scan for additional malware such as adware or spyware test to determine whether
the computer has a worm.
c) If a mobile device is
detected as non- compliant, the system shall be quarantined to prevent any
potential threat source from harming neighbouring systems independent of any
other access control method that may be in place.
·
Any use of peer to
peer/content sharing network software to transmit or access material into/out
of Babtain's network is prohibited.
·
Ensure that when
staying in hotels, that the safety deposit boxes (if available) are used to
store unattended equipment
·
And ensure that
equipment is not left unattended at anytime
The Mobile Computing
policy applies to all laptops and mobile computing devices that are used to
store or process Babtain’s data.
Mr. Burhanuddin
Ali Sr. System
Administrator
Mr.
PDA (Personal Digital
Assistant) are basically enhanced organizers or toned-down laptops.
Password:
It’s a sequence of
characters that one must input to gain access to a file, application, or
computer system. Also called “passkey”
Custodian:
Representative of the
owner who is a guardian or caretaker; the agent charged with implementing the
controls specified by the owner. The custodian is responsible for the
processing and storage of information.
Terms and Condition of usage of mobile devices:
This policy is approved by the Group CIO (Chief
Information Officer). Request for clarifications on this policy can be sent to
the Group CIO (winston.ellison@babtain.com.kw)
Auditing periodically for compliance with the
policy is the responsibility of all Managers.
This policy document
is reviewed by Group IT once in a year; updated with modifications and updates
are carried out if required and the policy is then approved.
P.S. The mentioned procedures are built on standard practice and
can be changed upon business and technology environment. And/or IT new
frameworks, new roles & responsibilities across IT resources and business
owners demand.
END
OF DOCUMENT