Skip to content
arrow_back
search
ISM-1082 policy ASD Information Security Manual (ISM)

Develop and Maintain Mobile Device Usage Policy

Ensure a policy is in place to guide how mobile devices are used in the organisation.

record_voice_over

Plain language

This control is about having a clear policy for how mobile devices are used in your organisation. Imagine if your staff could just use their phones to access company data without any rules — it could lead to security risks if a device is lost or stolen. A proper policy helps protect sensitive information and ensures everyone knows what's allowed and what's not.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2022

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

A mobile device usage policy is developed, implemented and maintained.
policy ASD Information Security Manual (ISM) ISM-1082
priority_high

Why it matters

Without a mobile device usage policy, unmanaged BYOD and app use can expose sensitive data via loss/theft, insecure apps, or unauthorised access.

settings

Operational notes

Review the mobile device usage policy at least annually; cover BYOD eligibility, MDM enrolment, app allow/deny lists, encryption, lock screens and reporting lost devices.

Mapping detail

Mapping

Direction

Controls