ISO Procedure PCI Mobile Device Management Configuration and Deployment

This procedure defines the process for joining Apple mobile devices to the MDM solution when used as a Point of Sale device in conjunction with payment cards.

Procedure for Configuration, Management, and Deployment of Apple Mobile Devices for use in PCI

Procedure Description:  This procedure is a step-by-step process designed to provide support staff guidelines and practices to initiate and complete XXX.  The procedure is maintained for standardization and repetition of the process.

The Information Security Office o Procedure aligns with and extends the Rice University and Information Security Policies. In order to minimize risks associated with incidental or malicious acts that cause the unintended exposure of confidential and sensitive information associated with Rice University, this document defines a process for XXXX using the identification, classification, and management method.  The processes and procedures defined here are meant to be part of an overall measure of due care and diligence for managing Rice data.  These processes should be periodically reviewed and as required repeated over time to ensure that changes to the service and function do not modify the risk profile in such a manner as to inappropriately place Rice confidential and sensitive information at undue risk.

ISO Procedure PCI Mobile table
 Date  Modification Type  Modified by  Approver
 3/6/2019  Created  bribbeck  

Scope: This procedure applies to any system or service storing, displaying for general access as a server, or transiting Rice University confidential or sensitive data defined in Rice Policy 808 or 832 and in alignment with Rice Policy 841.

  • The process should be initiated for any new service
  • The process should be initiated for any existing service that has a change of terms of service, company ownership, substantial change in use or management, change in data type, or compliance requirements.

Operating Standards:
Communications and documentation:
Step by Step Process to complete a risk assessment

  1. Access to Box and the Risk Assessment folder

Keywords:Information Security, Procedure, PCI, MDM, JAMF, Apple School Management Program   Doc ID:90182
Owner:Barry R.Group:Rice University
Created:2019-03-06 07:07 CSTUpdated:2022-12-06 00:43 CST
Sites:Rice University
Feedback:  0   0