Conferences & Events
Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Library Taxonomy
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 8 Mobile Device Security Steps, EDUCAUSELive!, October 2013. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the most effective strategies for securing mobile infrastructure.
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy.
Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy, June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011.
Mobile Internet Device Security Guidelines, June 2011
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Ten Steps to Secure Your Mobile Device, August 2010
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Presentations and Seminars
- Managing and Securing Mobile Devices in Higher Education, May 2013.
Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk.
Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared.
Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus.
Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks.
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
- An Introduction to BYOE Mobile Data Collection
April 24, 2014
Smartphone ownership among college-aged Americans is high and growing , and many students own more than one mobile device. Such devices are increasingly incorporated into the academic live…
- Legal Issues for Higher Ed Technology Professionals: Spend an Hour with Lawyers to Prevent Spending Many Hours with Lawyers
February 27, 2014
A session at the EDUCAUSE LIVE! - Legal Issues for Higher Ed Technology Professionals
Although higher education technology professionals may wish to spend their days working on the systems and services that make their campuses go, legal issues creep up in many corners of the field…
- Formal Planning Optimizes BYOE Opportunities: University of Florida
June 3, 2013
“Bring your own everything” ( BYOE ) represents more than people using their own devices on campus and upgrading the i nstitution’s wireless network accordingly. It is a convergenc…
- The Policy of BYOD: Considerations for Higher Education
April 1, 2013
Stephen diFilipo is Vice President and CIO at Cecil College. In December 2012, eWeek quoted Gartner Vice President Ken Dulaney: "IT has been saying this is the way, but…
- Applying for Cellular Phones & Mobile Devices
September 9, 2011
This Northern Arizona University policy concerns employees seeking an allowance on cell phones or mobile devices. This Northern Arizona Universit…
- Rowan University Personal Cell Phone and Mobile Device Usage Reimbursement Policy
September 7, 2012
This is the Rowan University policy on reimbursement of personal cell phones or mobile devices by the university. This is the Rowan University po…
- Pepperdine University Telecommunications Policy
September 25, 2013
These are policies and resources for the Pepperdine University Telecommunications Policy. Including FAQs. These are policies and resources for th…
- Mobile Communications Device Policy
September 1, 2013
Fairleigh Dickinson University created a Mobile Communications Device Policy to comply with new IRS related legislation concerning the taxability of employer provided cell phones. …
- Electronic Communications Allowance Program and Policy
December 19, 2013
This is the Angelo State Univerisity Employee Electronic Communication Resources Policy on cell phones, PDAs and Smartphones. This is the Angelo …
- Security Awareness and Communication in the C-Suite
October 4, 2012
Drawing on more than 30 years of global experience, Dave Cullinane will share challenges that CISOs face while in the C-suite. This session will focus on how to advance executive understanding …