Mobile Device Usage Policy

1.0 Purpose

The purpose of this policy is to establish guidelines for the appropriate use of mobile devices when accessing SQETCH Studio's information systems and data.

 

2.0 Scope

This policy applies to all employees, contractors, and consultants who use mobile devices to access SQETCH Studio's information systems and data.

3.0 POLICY

3.1 General policy

The following guidelines must be followed when using mobile devices to access SQETCH Studio's information systems and data:

  1. Security: All mobile devices used to access SQETCH Studio's information systems and data must be secured with a password, PIN, or biometric identification.

  2. Encryption: All mobile devices used to access SQETCH Studio's information systems and data must have encryption enabled to protect the confidentiality of data.

  3. Data Backup: All data stored on mobile devices used to access SQETCH Studio's information systems and data must be backed up regularly to a secure location.

  4. Off-boarding: All mobile devices used to access SQETCH Studio's information systems and data must be off-boarded when an employee leaves the company, following the Off-boarding Mobile Device Policy.

3.2 Prohibited activities

The following activities are prohibited when using mobile devices to access SQETCH Studio's information systems and data:

  • Accessing or transmitting offensive or discriminatory materials.

  • Accessing or transmitting copyrighted or trademarked materials without authorization.

  • Accessing or transmitting confidential or proprietary information without authorization.

  • Using mobile devices to harass or threaten others.

3.3 Off-boarding mobile devices

All mobile devices used to access SQETCH Studio's information systems and data must be off-boarded when an employee leaves the company. The off-boarding process must follow these steps:

  1. Notify the IT Lead: The employee's supervisor or HR should notify the IT Lead as soon as possible when an employee leaves the company.

  2. Backup and Transfer Data: The employee's data on the mobile device should be backed up and transferred to a secure location before the device is wiped or repurposed.

  3. Wipe or Repurpose Device: The mobile device should be wiped or repurposed for use by another employee if it is a company-owned device. If it is a personal device, the employee should be instructed to remove any company data from the device before leaving.

  4. Change Passwords: All passwords associated with the employee's access to company resources should be changed immediately upon the employee's departure.

  5. Deactivate Accounts: All accounts associated with the employee's access to company resources should be deactivated immediately upon the employee's departure.

4.0 Roles and Responsibilities

The following roles and responsibilities are defined for the Mobile Device Usage Policy:

  • The IT Lead is responsible for ensuring that all mobile devices used to access SQETCH Studio's information systems and data are secured, encrypted, and backed up.

  • All employees, contractors, and consultants who use mobile devices to access SQETCH Studio's information systems and data are responsible for complying with this policy.

 

5.0 Compliance

Failure to comply with this policy may result in disciplinary action, up to and including termination of employment.

 

 

Last Update: January 2023