Controlled Items

The organization should have policies describing what controlled items are and how they should be treated from a security perspective. The policies should carefully balance security controls versus convenience. The list should include, but not be limited to, the following:

  1. Portable devices (e.g. tablets, laptops, notebooks).
  2. Mobile phones.
  3. Cameras (incl. phones and other devices with camera capabilities).
  4. Portable media (USB drives/thumb-drives, hard-disk, memory cards etc.).
  5. Audio recorders.
  6. Devices with radio capabilities (e.g. Bluetooth, WiFi).
  7. Wearables.
  8. Firearms.