Skip to content
arrow_back
search
ISM-1887 policy ASD Information Security Manual (ISM)

Implement Remote Locate and Wipe for Mobile Security

Mobile devices should be set up to be located and wiped remotely to ensure security.

record_voice_over

Plain language

This control ensures that mobile devices are set up so they can be located or wiped clean remotely if they are lost or stolen. This is crucial because if a device with sensitive information falls into the wrong hands, it could lead to data breaches, loss of privacy, or financial harm. By enabling remote wipe and location tracking, you can protect against these risks by locking down devices immediately.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2023

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

Mobile devices are configured with remote locate and wipe functionality.
policy ASD Information Security Manual (ISM) ISM-1887
priority_high

Why it matters

If remote locate/wipe is not enabled, a lost or stolen mobile can leak sensitive data and increase breach and compliance risk.

settings

Operational notes

Periodically validate remote locate and wipe works (including offline/MDM-triggered wipe) and confirm location services are enabled per device policy.

Mapping detail

Mapping

Direction

Controls