Mobile Device Guidelines


Table of Contents

Mobile computing devices are devices such as tablets, smart phones, USB devices, and laptop computers. The very features that make these devices useful (portability, access connectivity, data storage, processing power, etc.) also make them a security risk to users and to the University of Maryland (UMD) when those devices contain University data. Major features of mobile devices that create risk to the user, and potentially the University as well, include their small size (they can easily be lost or stolen), weak user authentication mechanisms that can easily be compromised or simply disabled by the user, and their ease of disconnectedness.

This document explains general end-user security measures that can be taken on mobile devices. Taking action to personally ensure computer security helps protect everyone from data and identity theft, viruses, hackers, and other threats. Every member of the UMD community who uses a mobile computing device can make the Maryland computing environment more secure by following these best practices.

General security – Your IT staff may be able to assist you with the following

Top

Transmission security

Top

Application and data security

Top

Disposing of mobile devices

At some point all of our mobile devices will become obsolete and we will want to replace them with something new. When the time finally comes to get rid of these old devices, be sure to do so with care. Mobile devices often contain a plethora of sensitive information like addresses and phone numbers; sometimes even online account credentials. Thankfully the Federal Trade Commission (FTC) provides some useful guidance on the best ways to prepare your devices for disposal. Please read How to Protect Your Phone From Hackers to view their guidance.

Additional help

For additional help please contact DIT's Compliance Team at it-compliance@umd.edu.

Top