Go Premium for a chance to win a PS4. Enter to Win


Mobile Device E-mail Policy

Posted on 2010-11-23
Medium Priority
Last Modified: 2012-08-13
My organization wants to implement an e-mail policy for mobile devices.  To be more specific, we want each user that is allowed e-mail access (MS Exchange) on his mobile device to sign a contract that mentions the risk involved if a device is lost or stolen.  It should also mention that the IT Department will wipe a device if deemed necessary.  

Does anyone have experience with this type of contract?  I've been trying to find a contract that has already been written so that it contains the necessary legal jargon in it rather than making one from scratch that might leave loopholes.
Question by:chompone
LVL 28

Accepted Solution

peakpeak earned 500 total points
ID: 34203286
LVL 37

Assisted Solution

bbao earned 500 total points
ID: 34203731
a Template Mobile Phone Information Security Policy is available at


it is provided free of charge and is intended to be modified as appropriate for use for your organisation. you may try to refine it as per your particular policy and append it to your company's existing contract if necessary.

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here in this article, you will get a step by step guidance on how to restore an Exchange database to a recovery database. Get a brief on Recovery Database and how it can be used to restore Exchange database in this section!
Eseutil Hard Recovery is part of exchange tool and ensures Exchange mailbox data recovery when mailbox gets corrupt due to some problem on Exchange server.
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Suggested Courses
Course of the Month12 days, 14 hours left to enroll

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question