The mobile device security policy should be documented in the system security plan. Manage the assigned mobile with options: View mobile details.

This article was originally published here