Beruflich Dokumente
Kultur Dokumente
1 Scope1
All users of the Organisation Names wireless notebook computers [and other
mobile devices] are within the scope of this procedure.
2 Responsibilities
The Head of IT (CIO) is responsible for specifying and/or providing the firewalls,
anti-malware software, automatic updating, connectivity and backup facilities
required under this procedure.
1
Chapter 21 of IT Governance: An International Guide to Data Security and ISO27001/ISO27002 deals with
mobile computing. This template will need to be expanded to take into account mobile phones, Blackberries,
PDAs and any other mobile devices, and adjusted to reflect different decisions on connectivity.
Organisation Name Classification_3
3.8 [].
3.9 [].
3.10 Organisation Name provides users with appropriate training and awareness to
ensure that they understand the risks of wireless on the road computing and that
they understand and can carry out their agreed security obligations.
3.11 Work instruction ISMS DOC [ ] sets out how the corporate requirements set out in
Clause 3.1 and 3.4 above are enforced.
3.12 WI ISMS DOC [ ] sets out how the [VPN or other connectivity solution] is to be Commented [A2]: A risk assessment should drive your choice of
operated. connectivity
3.13 WI ISMS DOC [ ] sets out how e-mails are to be encrypted when sent from mobile Commented [A3]: A risk assessment should drive your decision
devices. on this
The Network Manager is the owner of this document and is responsible for ensuring
that this procedure is reviewed in line with the review requirements of the ISMS.
This procedure was approved by the Chief Information Security Officer (CISO) on
[date] and is issued on a version controlled basis under his/her signature.
Signature: Date: