Security policy

Question : Write a security policy for Company-owned cellphones that use the Bluetooth protocol