Description
This policy establishes the organisations guidelines for the management of devices, including those that are personally owned by third parties but used in the organisations operations. All devices need to be managed to ensure that there are the appropriate security measures in place to protect and secure information processed using the device.