Using Mobile Phones

Otherwise known as 'cell phones', 'portable phones' or 'hand phones', mobiles are being used more and more to communicate business information, and it has not gone unnoticed by those wishing to 'tap' or otherwise corrupt such information flow.

To view the related Policy click      

 

  • Theft of a mobile could result in the disclosure of confidential information to the 'new user'.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Confidential information may be overheard and / or tapped into.

There is 1 Key Action providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Relying upon the information in a text message sent to your mobile can result in inappropriate action / decisions.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Where mobiles are used by various persons, inappropriate personal calls to the mobile can aggravate business usage.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page