University sensitive information stored on a mobile computing device is at risk for unauthorized access and disclosure if appropriate security measures are not implemented to protect the device against loss or theft of information.
The best way to protect University sensitive information is to not store it on a mobile computing device; however, it is recognized that storage of University sensitive information on a mobile computing device may be necessary in certain situations. In these cases, encryption provides protection against unauthorized access and disclosure.
Encryption must be used in concert with other security measures to maximize protection of information technology resources and of University sensitive information. The Office of the Vice-Provost and Associate Vice-President (Information Technology) has provided a Mobile Computing Security website that contains further information about other security measures.
NOTE: Members of the University community are responsible for protecting University sensitive information, whether accessed from University-owned information technology resources or from personal, external or other resources.