Smart phones and tablets are personal computing devices which normally include an “always available” internet connection that makes these devices easy to use and convenient.
Due to the consumer nature of these devices they can introduce a risk to personal privacy and University data.
If you are using one of these devices for University business (including email) you must review the following advice.
Configure a passcode to gain access to and use the device, and set an idle timeout (e.g. 1 minute) that will automatically lock the device when not in use. This helps prevent unauthorised access to your data.
Keep all software up to date, including the operating system and installed Apps. This helps protect the device from attacks and compromises.
Do not "jailbreak" or "root" your device. These processes circumvent the manufacturer's protection mechanisms and may render your device unstable.
Disable services such as wireless, 3G and Bluetooth if you are not using them. This limits the exploits available to an unauthorised user.
Connecting to the University’s Exchange service provides the ability to remotely wipe a device, should it be lost or stolen, the next time it is on-line. The remote wipe functionality is enabled by default if you use Exchange for calendar or email.
Label your device with your name and a phone number where you can be reached to make it easy to return to you if it is lost.
Never leave your mobile device unattended - should your device be lost or stolen, report this immediately.
Remember to backup your device on a regular basis.
Know what you're downloading. Make sure you download Apps from reputable developers and sources.
If your device supports it, ensure that it encrypts its storage with hardware encryption.
Use tracing and tracking software (e.g. Lookout, iCloud). This will help you locate your device should it be lost or stolen. Note: a subscription fee may be required for these services.
This article was published on Mar 13, 2012