Mobile Access and Use Policy

Mobile Access and Use PolicyRegister Mobile Access and Use Policy - After you complete the form below, you will be directed to a page that will allow you to download the Table of Contents and selected pages of the Mobile Access and Use Policy.

The overriding goal of this policy is to protect the Company’s technology-based resources (such as corporate data, computer systems, networks, databases, etc.) from unauthorized use and/or malicious attack that could result in loss of information, damage to critical applications, loss of revenue, and damage to our public image. Therefore, all users employing wireless methods of accessing corporate technology resources must adhere to company-defined processes for doing so.

The purpose of this policy is to define standards, procedures, and restrictions for end users who have specific and authorized business requirements to access enterprise data from a mobile device connected via a wireless or unmanaged network outside of ENTERPRISE’s direct control.

Every organization needs to identify and develop mobile security policies to be deployed which will provide adequate protection. The level of protection has to be aligned with the level of risk that your organization is willing to accept. These policies should ensure that the many regulatory or compliance concerns that might be applicable are addressed. The mobile security policy should be integrated within your overall information security policy framework.

Please note that you are required to enter your e-mail address, your first name, and your last name. You will receive a copy of our next newsletter and at that time you will have an option to opt out of any future mailings from us.

By your completing this form you agree to honor our copyright and to receive at least one of our newsletters.

All fields are required.

We respect the privacy of your information and comply will all privacy mandates including GDPR and the California Consumer Privacy Act 2018. Our policy for use of the information gathered is as follows. Once you subscribe you have given us the right to send you at least one e-mail. When you receive that e-mail you will have the option to unsubscribe from future emails. If you do not purchase a product, we will automatically remove you from our database. IF you purchased a product your contact data will remain on our databaseas an unsubscripted user.

If you are a user that has unsubscripted and have purchased a product and want to remove your contact information you need to send an e-mail to support (at) e-janco.com with the subject line of "REMOVAL COMPLIANCE"

No Spam CAN-SPAM compliant

Janco Associates, Inc. is CAN-SPAM compliant and committed to protecting your privacy. For details, please see our privacy policy.