Overview:

To better protect our client’s data and the Firm’s systems we have implemented a mobile application security policy. As a part of that policy, we have outlined the requirements all mobile devices must meet to access firm data, systems, and services. These requirements apply to devices owned by staff and authorized personnel that will access Firm data and systems. These requirements are updated at regular intervals to keep up with current threats and best practices. It is the responsibility of each person to ensure their device meets the minimum requirements. Should you have any questions regarding these requirements please contact the Help Desk.


Approved Device Requirements:

Any device that will connect to Smith + Howard systems and services to access client or Firm data must meet the requirements below and must be able to install, run, and pass all tests from our Microsoft Intune Company Portal applications. The software must be installed and running on the device while any firm applications, data, or information is stored or accessed. Once removed all firm data and access will be terminated.


Approved Device Types:

  • Personal mobile phones
  • Personal tablet devices

Approved Device Operating Systems

Disallowed Device Types


At current the following device types are not approved for accessing Firm data or systems:

  • Non-Firm owned laptops
  • E-Readers. i.e.:
    1. Amazon Fire Tablets
    2. Amazon Kindle
    3. Barnes & Nobel Nook
    4. Other similar devices
  • Devices banned/ blocked by the US Government, i.e.:
    1. Huawei devices
    2. ZTE devices
  • Google Chromebooks
  • Devices running unapproved and outdated operating systems

Requesting Device Approval

 

If you have a device that you would like us to consider approving, please open a ticket and provide the following information:

  • A link to the manufacturer’s website with information about the device
  • A description of why you would like the device approved
  • A link to a US retailer of the device where it can be purchased

Due to the number of devices and users, we are unable to review and consider every device and so work from a popular list of well-tested and verified devices. If we are unable to find conclusive information regarding your device that it has been security checked by reputable sources and found safe and/ or if it is not listed on our Mobile Security software provider's list as supported then we will be unable to consider or approve your request as we do not have the resources to run internal testing and checks on devices.