Skip to content
arrow_back
search
ISM-0870 policy ASD Information Security Manual (ISM)

Secure Storage and Handling of Mobile Devices

Ensure mobile devices are secure when not in use to prevent unauthorized access.

record_voice_over

Plain language

Keeping mobile devices like smartphones and tablets secure when they are not in use is crucial to prevent strangers from accessing sensitive information. If not managed, someone could easily pick up an unattended device and steal important data, leading to potential financial loss or privacy breaches.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Mar 2019

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Mobile devices are carried or stored in a secured state when not being actively used.
policy ASD Information Security Manual (ISM) ISM-0870
priority_high

Why it matters

Unsecured mobile devices can be lost or stolen, enabling unauthorised access to corporate apps/data and causing privacy breaches and financial loss.

settings

Operational notes

Confirm devices auto-lock quickly, require PIN/biometric, and are stored in locked cabinets or secured with cable locks when not in active use.

Mapping detail

Mapping

Direction

Controls