Follow the policies of the organization whose internal network or system you are accessing with your mobile device at any given time. Read each organization's policies and procedures for mobile devices, and take any mobile device privacy and security training and education each organization offers. Read more about you, your organization, and your mobile device.