Information Security

Smartphones and tablets

These have access to all our email. Even if they are your own devices, encrypt them, and automatically lock them.

Whether you use your own smartphone or tablet, or a University-owned one, if you handle work-data on it (many of us do: we use work email), you need to secure these.

Encrypt your smartphones and tablets

As technology progresses, these devices become more and more like fully-fledged computers. You need protect them as carefully as you would a laptop. Even if you think you are not carrying sensitive information on them, in most cases, they could be used to access University information. If someone steals an unprotected phone, or tablet, they could use these to access your email, or other files or information that you had never intnded.

In short:

  • they could be misused without your consent or your knowledge,
  • generally many of these have access to your email

Erase devices securely before you pass them for use by another person

If the device is passed from one person to be used by another at work, you MUST erase all data from it, and in particular:

  • delete all configured email accounts (they would give a subsequent user access to your email)
  • delete all remembered WiFi access points (they would contain your WiFi password for example for EDUROAM)
  • re-install any departmental configurations for your workplace

In short: you should completely erase all configurations from these devices before you hand them to a new user.  Don't forget, if you are handing your old phone to a member of your family, erase it first

How to secure your smartphones and devices

Security for mobile phones and tablets

How this relates to University Policy

In addition to the information protectiuon polices here:

Information protection policies

the policy on taking sensitive information outside the University is particularly applicable. 

policy on taking sensitive information and personal data outside the secure computing environment.