Mobile Devices

Mobile devices, such as smartphones, tablets, and laptops have become a dominant device on campus. For faculty and staff, these devices afford unparalleled access to information, and can be an incredible productivity booster. They can also pose a substantial threat to the College from a security perspective.

The very nature of these devices makes them more susceptible to loss, theft, and damage.  The increased prevalence of these devices also makes them a larger target for hackers and malware authors.

Here are some tips for keeping your device, College data, and the College network safe while using your mobile device.

Do not store "Protected Data" on mobile devices

This includes in any cloud service storage provider, like Dropbox,, Google Docs, or other services.  Doing so is contrary to the College's "Written Information Security Plan".  You can read more about what constitutes "protected data" on the data security section.

Put passcodes on your devices

If your device is stolen, or an unauthorized person tries to use it while you aren't looking, a passcode can make the device unusable to them.

Ensure your device is encrypted

Apple iOS devices such as iPads and iPhones running iOS 5 or above are encrypted by default if a passcode is enabled on the device.  Other devices often have either third-party software that can encrypt the device, or have a built in option to encrypt.

Enable "remote wipe" features

In the event your device is lost or stolen, you can ensure that the data on the device is scrubbed if you have previously enabled and configured a remote wipe service. Since the College migrated to Google Apps, this functionality is available to users through their Google mail account if their device is configured to use it.

Do not leave your devices in your vehicle or hotel room unattended

These devices have inherent value, as can the data stored on them, making them an easy target for thieves.

Keep your devices and the apps you install on them up-to-date

Mobile devices are increasingly being targeted by malware authors and hackers.  Your best defense is to keep the device and the apps you put on it at their latest versions. See the software updates section for instructions on updating popular mobile devices.