Portable computing security standards
Purpose - The UTB Portable Computing Security Standard establishes the rules for the use of mobile computing devices, such as laptops and personal digital assistants (PDAs), and their connection to the network. These rules are necessary to preserve the integrity, availability and confidentiality of UTB information.
Audience - The UTB Portable Computing Security Standard applies equally to all individuals who use portable computing devices and access UTB information resources.
a. Portable computing devices used to access UTB information resources must not be on the list of banned devices. (At this time, there are no specific devices that have been banned.)
b. UTB data will not be stored on portable computing devices without documented permission from the data owner. Please see the following Security Operating Procedure: (Protecting Data on Vulnerable Devices).
c. Category A & B data must be encrypted when it is stored on portable devices or any device that faculty and staff use off campus. Please have a Track-It work order opened to have devices such as laptops encrypted.
d. Portable computing devices must be protected by password or other authentication device/process. Devices must also employ a screensaver/timeout lock which requires a passcode to gain access to the device after a period of inactivity. See this help article for assistance.
e. Unattended portable computing devices must be physically secured. They must be locked in an office, locked in a desk drawer or filing cabinet, or attached to a desk or cabinet via a cable lock system.
f. If a mobile device used to access UTB information resources is lost or stolen, the user should reset their password and contact email@example.com immediately.