Smartphones and tablets
These have access to all our email. Even if they are your own devices, encrypt them, and automatically lock them.
Whether you use your own smartphone or tablet, or a University-owned one, if you handle work-data on it (many of us do: we use work email), you need to secure these.
Encrypt your smartphones and tablets
As technology progresses, these devices become more and more like fully-fledged computers. You need protect them as carefully as you would a laptop. Even if you think you are not carrying sensitive information on them, in most cases, they could be used to access University information. If someone steals an unprotected phone, or tablet, they could use these to access your email, or other files or information that you had never intnded.
- they could be misused without your consent or your knowledge,
- generally many of these have access to your email
Erase devices securely before you pass them for use by another person
If the device is passed from one person to be used by another at work, you MUST erase all data from it, and in particular:
- delete all configured email accounts (they would give a subsequent user access to your email)
- delete all remembered WiFi access points (they would contain your WiFi password for example for EDUROAM)
- re-install any departmental configurations for your workplace
In short: you should completely erase all configurations from these devices before you hand them to a new user. Don't forget, if you are handing your old phone to a member of your family, erase it first
How to secure your smartphones and devices
How this relates to University Policy
In addition to the information protectiuon polices here:
the policy on taking sensitive information outside the University is particularly applicable.
policy on taking sensitive information and personal data outside the secure computing environment.