-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Mobile Security [x]
- Cybersecurity (55)
- Security Management (55)
- Information Technology Management and Leadership (43)
- Distributed Computing (42)
- Mobile Computing (41)
- Privacy (16)
- Policy and Law (15)
- BYOD (14)
- Mobile Policy (13)
- Data Security (12)
- Mobile Infrastructure (11)
- Mobile Support (11)
- Federal Policy and Law (9)
- Network Security and Applications (9)
- Campus Policies (8)
- Campus Policy and Law (8)
- Online Privacy (8)
- Networking and Emerging Technologies (7)
- Smartphones (7)
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy. -
Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy , June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011. -
Mobile Internet Device Security Guidelines, June 2011
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by Internet2 and the Higher Education Information Security Council (HEISC). -
Ten Steps to Secure Your Mobile Device, August 2010
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Presentations and Seminars
-
Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk. -
Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared. -
Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus. -
Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011
Updated May 2012
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks.
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
-
Mobile Security
-
Mobile Security True Information security takes on new di…
-
What Does BYOE Mean for IT?: IT Leader Roundtable
-
May 15, 2013
The bring-your-own-everything (BYOE) phenomenon continues to gain momentum as more students, faculty, and staff use personal devices and services on campus. The person who previously brou…
-
Containing the Security Threat of Mobile Apps in Higher Ed
-
May 6, 2013
Key Takeaways Security breaches and data loss become likelier as more students, faculty, and staff bring their own devices to campus. With a growing number of new offeri…
-
Executive Summary: BYOD and Consumerization of IT in Higher Education Research, 2013
-
April 1, 2013
"What excites IT leaders in higher education most about BYOE are opportunities to diversify and expand the teaching and learning environment, while the greatest challenges are issues th…
-
Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in Heaven?
-
January 28, 2013
Michael Corn is Chief Privacy and Security Officer at the University of Illinois, Urbana-Champaign. Jane Rosenthal is Director of the Privacy Office at the University of Kansas. Where doe…
-
Sensitive Regulated Data: Permitted and Restricted Uses
-
July 18, 2012
The University of Michigan engages in research, teaching, clinical, and business activities that encompass a variety of sensitive regulated data. This standard defines permitted and restricted us…
-
AT&T Splits Phones into Work and Personal Partitions, on any Carrier
-
June 15, 2012
AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat. A new virtualization-style technology…
-
7 Ways BYOD Could Get You Sued
-
July 18, 2012
The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…
-
Can Big Data Help Universities Tackle Security, BYOD?
-
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
-
For BYOD Best Practices, Secure Data, Not Devices
-
July 17, 2012
Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …

















