To earn a TISAX label, organisations must meet the requirements of TISAX 3.1.4 for Mobile IT Devices and Mobile Data Storage Devices. Although many set basic controls, these often fall short. Sometimes, definitions are unclear, evidence is missing, or rules are not applied consistently. As a result, compliance gaps appear, bringing security risks and audit problems.
The Problem
Many organisations think they manage mobile devices well, yet they do not always fully meet TISAX 3.1.4 requirements. Usually, several common problems appear, such as:
- USB sticks may be controlled, but other storage media (SD cards, portable hard drives) are overlooked.
- Encryption and access protection may be defined, but device marking is missing—especially important when working on customer sites.
- MDM is used, but no device register exists for laptops, phones, or tablets, reducing traceability.
- Users are not warned when data protection is absent, such as when using unmanaged apps or unencrypted storage.
- Templates exist, but organisations cannot prove they are being applied in practice.
Because of these gaps, organisations have weaker protection and less traceability. As a result, partial conformity often appears during TISAX assessments.
Solution
Meeting TISAX 3.1.4 requirements needs a clear and well-documented approach for all mobile IT devices and portable storage media. To succeed, organisations should focus on these elements:
Clear Device Requirements
Define the rules for all device types, including:
- Encryption
- PIN/password access protection
- Physical marking
- Approved use cases
Controls must apply to:
- Laptops and phones
- Tablets
- USBs, SD cards, portable hard drives
- Any device storing or processing business data
Formal Asset Register
Maintain a central mobile device register showing:
- Device type
- Serial number
- Assigned user
- Encryption status
- MDM enrolment
- Issue and return dates
By following this process, organisations gain complete traceability and can make audits much simpler. In addition, it becomes easier to provide evidence of compliance when needed.
User Notifications & Warnings
Implement processes that notify users when:
- Encryption is unavailable
- Apps are unmanaged
- Storage occurs outside corporate control
Clear communication with users helps reduce accidental misuse. Moreover, it encourages responsible behaviour and supports ongoing compliance in the future.
Process Integration
Organisations should include these requirements in HR, IT, and security processes. As a result, enforcement remains consistent from onboarding to offboarding, reducing the risk of compliance gaps.
Deliverables
Policies & Procedures
Create and maintain:
- A mobile device policy covering encryption, access control, marking, and customer‑site requirements
- A mobile storage device policy for USBs, SD cards, and portable hard drives, including restrictions or prohibitions
Asset Management
Maintain an updated device register showing:
- Device details
- User assignments
- Compliance status
- Dates of issue and return
User Awareness & Acknowledgements
Provide training and communication materials covering:
- Secure mobile use
- Risks of unencrypted storage
- Approved apps and services
Collect acknowledgements where appropriate.
Technical Enforcement (MDM)
MDM settings should enforce:
- Encryption
- Authentication
- Auto‑lock
- Remote wipe
- Monitoring for non‑compliance
Outcomes
By implementing these measures, organisations achieve important outcomes:
- Complete control over mobile IT devices and storage media
- Consistent enforcement across departments
- Full traceability and accountability
- An informed workforce that understands risks
- Alignment with TISAX Maturity Level 2.1 expectations
As a direct result, these outcomes strengthen the organisation’s security and support smooth, successful TISAX assessments. In addition, employees become more aware of their responsibilities.
Benefits or Results
When organisations adopt this approach, several key benefits emergel key benefits emerge:
- Stronger protection for mobile devices and data
- Fewer TISAX non‑conformities
- A complete, traceable device inventory
- More consistent employee behaviour
- Greater confidence when working at customer sites



