Mobile Device Security
The University reserves the right to require any mobile device accessing the University's infrastructure to be subject to existing/future mobile device security policies and standards as established by the University's Information Security Office. This applies to both University and personally-owned devices.
Security policies may include, but are not limited to, device requirements for mobile anti-virus/spyware, mobile firewall, secure communications, encrypted file folders including storage cards, strong passwords, two-factor authentication, and/or destruction and disabling in the event of a lost or stolen device or termination. Costs for any mobile security measures will become the financial responsibility of the device owner.