Answer yes if your organisation enforces security controls on BYOD endpoint devices to an equivalent standard of the security controls on organisation-issued devices, before access to company data or services is granted. For example, this could be done through the use of containerised MDM or UEM software. In the notes, describe the nature of the controls, the method of enforcement and any related processes. If there is a difference in the level of control between organisation-issued devices and BYOD, describe that in the notes section, including any compensating controls.
This question helps your clients understand whether or not there is a risk of a security incident occurring through the use of mobile phones at your organisation. If your organisation's employees can access company data through their mobile phones, it's important that your organisation has some basic security controls in place to protect these devices.
These controls include having all of the mobile devices secured with a biometric (fingerprint) based lock or pin based lock, installing mobile anti-malware, ensuring that all of the mobile devices are encrypted, and having the ability to remotely wipe the devices if they are lost or stolen.
This question is an informational question that looks at whether or not your employees can access company data through their mobile phones.
If your employees can access company owned data (such as emails or company storage drives) through their mobile devices, answer yes.
If you would like to contribute to this article or provide feedback, please email knowledge@riskledger.com. Contributors will be recognised on our contributors page.