Mobile Computing Policy and Best Practice

Mobile Computing Policy and Best Practices

Responsible Unit: Information Technology Services

Mobile computing devices are devices such as tablets, smart phones, e-readers, laptop computers, and external storage devices such as hard drives and flash drives. The very features that make these devices useful (portability, access connectivity, data storage, processing power) also make them a security risk to users and to KCTCS/BCTC when they contain data about people, objects and events, or derivations of these data. Major features of mobile devices causing risk to the user and potentially the KCTCS/BCTC include their small size (they can be easily lost, stolen, or misplaced); weak user authentication mechanisms that can be easily compromised or simply disabled by the user; and their ease of interconnectedness.

As mobile devices become more powerful and ubiquitous, they need to be treated with the same or greater care than personal computers. Taking action to personally ensure KCTCS account security helps protect everyone from data and identity theft, viruses, hackers, and other threats. Every member of the KCTCS/BCTC community who uses a computing device will ensure information security by following the best practices found in the following document: