Skip to content
arrow_back
search
ISM-1078 policy ASD Information Security Manual (ISM)

Develop and Maintain Telephone System Usage Policy

Create and keep a policy for how phones should be used within the organisation.

record_voice_over

Plain language

This control is about making sure your organisation has a clear, up-to-date policy on how employees should use telephones at work. It matters because without guidelines, there can be misuse, like long personal calls or data leaks through unsecured phone conversations. This can lead to increased costs or risk of sensitive information falling into the wrong hands.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

A telephone system usage policy is developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1078
priority_high

Why it matters

Without a telephone system usage policy, staff may share sensitive data over insecure calls and incur unauthorised call charges, increasing fraud and privacy breach risk.

settings

Operational notes

Review phone/PBX logs for unusual calling patterns, define permitted use and recording rules, and update the policy when new telephony or messaging features are introduced.

Mapping detail

Mapping

Direction

Controls