Mobile devices, including smartphones, tablets, PDAs, and other similar devices are often significant risks due to their portability and broad utilization for work and personal needs. If your mobile device is lost, stolen, or compromised, your personal information and any relevant University data may be placed in jeopardy.
App State employees who utilize personal mobile devices to conduct Appalachian State University business should be aware of conditions unique to this use.
ITS has provided a set of awareness items and security steps that can help protect your mobile computing devices.
Personal Information is like money. Value it. Protect it.
Your mobile device contains significant information about you, your friends, and your family. Think about the contact numbers, photos, and so much more stored on your device.
Guidelines for keeping your mobile devices and the data they contain secure:
|
You can install security apps that enable remote location and wiping. Some are automatically installed such as Find My iPhone on Apple devices; while others need to be downloaded. Downloading security apps for Android or Windows Mobile devices is generally safe (provided the apps are from a legitimate app market such as Android Market or Google Play.) Security apps must be set up before the phone is lost or stolen. Risks of rooting or jailbreaking your phone:
|
The Information Technology Support Center offers services to help you set up your mobile devices and make sure they are secure.
Contact them at 828-262-6266, enter a support ticket at https://support.appstate.edu/, or visit them on the bottom floor of Anne Belk Hall. Room 140.
Free Mobile Antivirus Software:
Many App State employees utilize personal mobile devices to help conduct University Business. Below is a list of relevant items. This list is to help spread awareness of our shared responsibilities when using personal devices while conducting University business.
The University does not currently centrally manage the security of personal mobile devices. For this reason, employees need to be aware that they are individually responsible for the security of their personal mobile devices. To help address this responsibility, ITS strongly recommends following the security Protocols listed below. |
University data that has been classified as Confidential or Sensitive should not be stored on personal mobile devices. Common examples of data that should not be stored on these devices include:
|
All App State employees are subject to the North Carolina Public Records Act (NCGS Chapter 132). This act provides a method for third parties to request records associated with the public business of all state agencies, including App State. If University-related materials are stored on personal mobile devices (i.e. work-related SMS messages, voicemail recordings, electronic work documents) then those personal devices may be subject to such a request as the device may be viewed as being used to facilitate official University business. This could mean that employees could be required to present all of the information from the mobile device to the University for inspection and possible disclosure should the University be legally compelled to produce materials. |
App State employees must follow University policies when conducting University business irrespective of whether the resources used are managed or owned by the University or not. Therefore, it is important to keep in mind that mobile devices that are used to conduct University business and access University data are subject to University policies and standards.
An important first line of defense for your mobile devices is making sure that someone can't easily access your data should you accidentally misplace your tablet or smartphone.
|
When you encrypt your mobile device, you add a layer of protection around your data that makes it more difficult to read should your device be lost or stolen. Note that the utilization of encryption of mobile devices requires that your device utilize a screen lock (see Step #1).
|
One of the most common security issues with mobile devices is that they can be easy to lose and are often attractive to thieves. Loss and Theft Protection features can help you potentially locate your device and/or send commands to render the device as well as its data unusable.
|
Because our mobile devices go with us wherever we go, it is easy to become accustomed to using wireless networks in a manner that can expose our information.
|
Related articles appear here based on the labels you select. Click on macro below to add or change labels. Click the previewed article for detailed instructions.