Skip to main content

Mobile Device Security Guidelines

 

Policy Statement:

N/A

Background Issues:

Mobile devices continue to expand in their popularity and usage, blending the functions of the "typical" personal computer and telephone. As these mobile devices replace the role of the traditional computer, they are exposed to an increasing number and sophistication of threats of compromise from malware, theft and loss. Unfortunately, the typical methods used to protect a personal computer are not often available for mobile devices.

Purpose:

This document provides guidance on safely using mobile devices. The rapid development and subsequent deployment of these devices precludes specific instructions so this document will provide general recommendations. You are responsible for consulting the owner/operator manual for your specific device in order to enable the specific features available on your device. Additionally, there are several excellent sources of information to assist you in securing your device; these are noted in the Additional Information section of this page.

Legally/Contractually Restricted Data
Recommendations

Policy Review Date:

July 2012

December 2016

Original Issue Date:

September 2010

Revision Dates:

July 2012

November 2011

December 2016

Additional Information:
Back to top