Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by Presentations
Filter by Library Taxonomy
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 8 Mobile Device Security Steps, EDUCAUSELive!, October 2013. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the most effective strategies for securing mobile infrastructure.
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy.
- Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy, June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011.
- Mobile Internet Device Security Guidelines
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by the Higher Education Information Security Council (HEISC).
- Ten Steps to Secure Your Mobile Device
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by the Higher Education Information Security Council (HEISC).
Presentations and Seminars
- Managing and Securing Mobile Devices in Higher Education, May 2013.
- Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk.
- Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared.
- Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus.
- Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
- New Year, New Challenges: Preparing Your Campus for Data Privacy and Security Issues in the Year Ahead
December 19, 2013
As technology continues to evolve, so do the data privacy and security risks facing colleges and universities. New products and programs have made it easier to teach, gather, and share informat…
- TEACH Act Update: The Path to Voluntary Guidelines for Accessible Instructional Materials
September 22, 2015
A session at the EDUCAUSE LIVE! - TEACH Act Update
In November 2013, the Technology, Equality, and Accessibility in College and Higher Education (TEACH) Act was introduced in Congress. The bill was intended to foster the development of voluntary …
- The Power of Privacy and the Passion to Build Something Better
January 20, 2015
A session at the EDUCAUSE LIVE! - The Power of Privacy and the Passion to Build Something Better
Privacy is a systems management and compliance issue, a unique and dynamic student and faculty requirement, and a topic of expanding innovative possibilities as an ever-present element in higher …
- Privacy and the Connected Campus
May 21, 2013
As students, scholars, and administrators use today’s connected online tools , they leave behind a “ data exhaust ” that can reveal a surprisingly detailed picture of individual activi…
- HathiTrust: The Collection and Its Uses
May 6, 2013
John Wilkin and Sigrid Anderson Cordell provide an overview of HathiTrust and will discuss some uses of the materials in the repository. HathiTrust is the world's largest research libr…
- Finding the Public Domain: 19 Institutions Making an Impact
November 5, 2014
A session at the EDUCAUSE LIVE! - Finding the Public Domain
Working together through the IMLS-grant funded Copyright Review Management System (CRMS), nineteen libraries collaborate daily in identifying public domain volumes held in the HathiTrust Digital Li…
- Inclusive Teaching and Learning Practices: Applications of Universal Design
April 1, 2013
Most postsecondary faculty and administrators desire to make teaching and learning opportunities engaging for all students, but many do not feel fully prepared to ensure that their offerings are …
- Born Digital - and Accessible
January 28, 2013
Join Malcolm Brown, EDUCAUSE Learning Initiative director, and Veronica Diaz, ELI associate director, as they moderate this webinar with Larry Goldberg and Madeleine Rothberg of WGBH NCAM. The di…
- U.S. Department of Homeland Security Cybersecurity Engagement for Colleges and Universities
July 24, 2014
A session at the EDUCAUSE LIVE! - U.S. Department of Homeland Security Cybersecurity Engagement for Colleges and Universities
The U.S. Department of Homeland Security (DHS) is increasing its efforts to enhance cybersecurity awareness and network protection at colleges and universities in response to the recent wave of c…
- Data Privacy Month: Are You Smarter Than Your Phone?
January 9, 2013
Nearly everyone on a college campus today has a mobile phone, capable of accomplishing amazing tasks while on the go. But, how SHOULD you make use of your smartphone? You are smarter than your ph…