Audit of the Cost and Security Policies and Procedures for USAID's Mobile Devices
Recommendations
USAID's Chief Information Officer implement documented policies that define the conditions for remotely wiping mobile devices if the device is lost or stolen and is at risk of having its data recovered by an unauthorized individual or entity and for failed password attempts.
USAID's Chief Information Officer implement documented policies that define the conditions for remotely locking devices suspected of being left unlocked in an unsecured location.
USAID's Chief Information Officer implement documented procedures for digitally signing USAID-developed applications.
USAID's Chief Information Officer implement documented procedures that describe how policies will be managed on BlackBerry Enterprise Servers.
USAID's Chief Information Officer implement
documented policies that define which types of mobile devices are permitted to access the Agency's resources.
USAID's Chief Information Officer implement
documented policies that define the degree of access that various classes of mobile devices (e.g., organization-issued devices versus those that are personally owned) can have to Agency resources.