4 Descriptions of application control policy rules..................................................................................................................... 316
Are Internal Network Connections Allowed application control policy rule............................................................................ 316
Are External Network Connections Allowed application control policy rule........................................................................... 316
Are Local Connections Allowed application control policy rule................................................................................................
317
Is Access to the Phone API Allowed application control policy rule.........................................................................................
317
Is Access to the Email API Allowed application control policy rule..........................................................................................
317
Is Access to the PIM API Allowed application control policy rule............................................................................................. 318
Is Access to the Browser Filters API Allowed application control policy rule.......................................................................... 318
Is Access to the Event Injection API Allowed application control policy rule.......................................................................... 319
Is Access to the Serial Port Profile for Bluetooth API Allowed application control policy rule.............................................. 319
Is Access to the Handheld Key Store Allowed application control policy rule........................................................................ 319
Is Key Store Medium Security Allowed application control policy rule.................................................................................... 320
Is Access to the GPS API Allowed application control policy rule............................................................................................ 320
Is Theme Data Allowed application control policy rule..............................................................................................................
321
Is Access to the User Authenticator API Allowed application control policy rule..................................................................
321
Can Device Settings be Modified application control policy rule............................................................................................. 322
Is Access to the File API Allowed application control policy rule.............................................................................................. 322
Is Access to the Media API Allowed application control policy rule......................................................................................... 322
Is Access to the Screen, Microphone, and Video Capturing APIs Allowed application control policy rule......................... 323
Can the Security Timer be Reset application control policy rule.............................................................................................. 323
Is Access to the Wi-Fi API Allowed application control policy rule........................................................................................... 324
List of Internal Domains application control policy rule............................................................................................................ 324
List of External Domains application control policy rule............................................................................................................ 324
List of Browser Filter Domains application control policy rule.................................................................................................. 325
Is Access to the Interprocess Communication API Allowed application control policy rule.................................................. 325
Disposition application control policy rule................................................................................................................................... 326
Is Access to the Module Management API Allowed application control policy rule.............................................................. 326
5 Examples of security policy goals............................................................................................................................................. 327
Defining acceptable use of passwords and passphrases on BlackBerry devices.................................................................... 328
Defining measures to protect BlackBerry devices from unauthorized use.............................................................................. 329
Defining the encryption strength that the BlackBerry device uses to protect data............................................................... 329
Restricting unsecured messaging........................................................................................................................................ 330
Defining measures to prevent threats from viruses and malicious users................................................................................ 330
Limiting the resources that third-party applications installed on BlackBerry devices can access...............................
331