Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 8 Mobile Device Security Steps, EDUCAUSELive!, October 2013. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the most effective strategies for securing mobile infrastructure.
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy.
Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy, June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011.
Mobile Internet Device Security Guidelines, June 2011
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Ten Steps to Secure Your Mobile Device, August 2010
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Presentations and Seminars
- Managing and Securing Mobile Devices in Higher Education, May 2013.
Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk.
Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared.
Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus.
Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks.
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
- Trusting Bad Code from Day One
December 6, 2013
Stu Sjouwerman is the founder and CEO of KnowBe4 , which provides web-based Internet Security Awareness Training (ISAT) to small and medium-sized enterprises. Vint Cerf is often …
- MOOCsâ€”Key Legal and Policy Issues for Colleges and Universities
July 25, 2013
The National Association of College and University Attorneys (NACUA), ACE, and EDUCAUAUSE held a webinar on July 25th, 2013 on the key legal and policy issues regarding massive open online course…
- Privacy and the Connected Campus
May 21, 2013
As students, scholars, and administrators use today’s connected online tools , they leave behind a “ data exhaust ” that can reveal a surprisingly detailed picture of individual activi…
- Getting Started in Privacy: Recommendations from the Higher Education Chief Privacy Officers (HE-CPO)
April 1, 2013
Whether you are a Chief Privacy Officer (CPO) at your institution, have responsibility for privacy on your campus, or just want to learn more about becoming a privacy professional in higher educa…
- ECPA Reform Update
February 11, 2013
Recording of the January 29, 2013 call with Greg Nojeim, Senior Counsel at the Center for Democracy & Technology on the Electronic Communications Privacy Act (ECPA) reform and its implication…
- EDUCAUSE Groups Briefed on ECPA Reform and Its Implications for Higher Education
February 11, 2013
As part of Data Privacy Month on January 29, 2013, Greg Nojeim , Senior Counsel at the Center for Democracy & Technology (CDT) and the Director of its Project on Freedom, Security &…
- Privacy and Data Management on Mobile Devices
September 6, 2012
A new survey by the Pew Research Center’s Internet & American Life Project found that more than half of mobile application users have uninstalled or avoided certain apps due to concerns abo…
- 7 Ways BYOD Could Get You Sued
July 18, 2012
The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…
- Electronic Communications Privacy Act Modernization Act of 2012
August 18, 2012
The Electronic Communications Privacy Act Modernization Act of 2012 (H.R. 6339), sponsored by Rep. Jerrold Nadler (D-NY) and Rep. John Conyers Jr. (D-MI), aims to bring legislation originally…
- EDUCAUSE Joins Letter in Support of the Electronic Communications Privacy Act Amendment
August 3, 2012
While the Cybersecurity Act ( S. 3414 ) was defeated on August 2, 2012, there was a specific privacy amendment filed by Sen. Patrick Leahy (D-VT) of interest to the EDUCAUSE community. Sena…