Skip to content
arrow_back
search
ISM-1299 policy ASD Information Security Manual (ISM)

Personnel Awareness for Secure Mobile Device Usage

This guideline advises on secure mobile device use to prevent data theft or compromise.

record_voice_over

Plain language

These guidelines are about using your phone and other mobile devices safely to protect important data. If you don't follow them, you could accidentally let someone steal sensitive information or even allow harmful software onto your device, which can lead to major problems like identity theft or financial loss.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Aug 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Personnel are advised to take the following precautions when using mobile devices: - never leave mobile devices or removable media unattended, including by placing them in checked-in luggage or leaving them in hotel safes - never store credentials with mobile devices that they grant access to, such as in laptop computer bags - never lend mobile devices or removable media to untrusted people, even if briefly - never allow untrusted people to connect their mobile devices or removable media to your mobile devices, including for charging - never connect mobile devices to designated charging stations or wall outlet charging ports - never use gifted or unauthorised peripherals, chargers or removable media with mobile devices - never use removable media for data transfers or backups that have not been checked for malicious code beforehand - avoid reuse of removable media once used with other parties' systems or mobile devices - avoid connecting mobile devices to open or untrusted Wi-Fi networks - consider disabling any communications capabilities of mobile devices when not in use, such as Wi-Fi, Bluetooth, Near Field Communication and ultra-wideband - consider periodically rebooting mobile devices - consider using a VPN connection to encrypt all cellular and wireless communications - consider using encrypted email or messaging apps for all communications.
policy ASD Information Security Manual (ISM) ISM-1299
priority_high

Why it matters

If personnel ignore safe mobile practices (untrusted charging, Wi‑Fi, peripherals or media), devices can be compromised, causing data theft and incidents.

settings

Operational notes

Reinforce do’s/don’ts: don’t leave devices unattended, avoid open Wi‑Fi, block unknown charging/media, and remind staff to disable radios and use VPN/encrypted apps.

Mapping detail

Mapping

Direction

Controls