If you use your smartphone or tablet to store or process sensitive information such as Social Security numbers, student grade information, or patient health information, follow the directions below to secure your mobile devices. Even if you are completely certain you don’t work with any sensitive information on your smart phone or tablet, the information below can still help you keep your personal information safe.
Steps
Please expand the section that corresponds to the device(s) you use. If you would like help implementing any of these items, please call the Technology Support Center at 942-2911.
The instructions in this section are based on a Galaxy S3 running OS version 4.3. Your device’s location of items and services may vary.
Warning: If your PIN/Password is lost while the device is powered off the device can only be recovered by a factory reset.
You must enable lock screen before your phone will allow encryption to be turned on.
Notice: The steps outlines below may change from device to device. Recovery of a locked device is done through your Google account.
Open the system settings menu. This is often done by pressing the menu button the device from the home screen and selecting settings.
Find and Open the Security menu. On older phones it will be called Location & security
Select Screen Lock. On older devices it will be called Configure lock screen
Select either PIN or Password
Adjust the idle time before the screen locks
Open the system settings menu
Tap the Display or Screen option
Tap the timeout or sleep option
Select the time you are comfortable with
Once started the encryption process must not be interrupted or data loss will result.
Notice: The steps outlines below may change from device to device.
Find a time when you will not need your device for an hour or two.
Charge your device and leave it plugged in for the procedure
Open the system settings menu. This is often done by pressing the menu button the device from the home screen and selecting settings.
Find and Open the Security menu. On older phones it will be called Location & security
Tap Encrypt phone/tablet
Make sure the phone is charged, plugged in, and a PIN/Password has been set.
Tap Encrypt phone/tablet. Tap Encrypt phone/tablet on the next warning screen as well
After the process is complete reboot the phone if it did not do so itself. The encryption was successful if you are prompted to enter your PIN/Password on system boot.
Category-1 information is information that, if revealed publicly, could cause significant damage to the individual it describes and bring severe repercussions to the university. The most clear example of this is the Social Security number and its relation to identity theft.
Any smart phone, tablet, laptop, desktop, or other computer owned by an individual.
Data classification is the confidentiality of information based on how much damage could be done if that information were revealed publicly.
Any information, if exposed, that could cause damage to the person it describes. Examples include Social Security numbers, credit card information, and student grades all of which are Category I data.
Changes are being made to the university’s networks that will prevent any unsecure device from connecting to the network. We will be rolling those changes out over time and notifying employees of their requirements.
The terms confidential and private are interpreted differently by each individual and tend to create confusion as to what term indicates greater sensitivity.
The ability and process allowing a device to have a command sent remotely to it ordering the device to delete information from the device. Typically, the command must be sent so that it cannot be prevented from executing by the person currently in possession of the device. This is performed as a result of a loss or theft.
Anti-malware is software that prevents hacking programs (malware) from harming your information or covertly taking control of your device thereby exposing sensitive information.
Encryption is the process of mathematically hiding your information so that it can only be read by using the correct access, usually a user log in or special token.
You should make sure the information is available to our constituents. Some malware and hacking activity seeks to destroy or erase information.
Other security concerns you should know
Make sure you watch out for scam emails, and avoid illegal sharing of protected intellectual property.