Skip to content

Information Security Standards

PORTABLE COMPUTING

GENERAL

Portable computing devices are becoming increasingly powerful and affordable. Their small size and functionality are making these devices more desirable to replace traditional desktop devices in a wide number of applications. However, the portability offered by these devices may increase the security exposure to individuals using the devices.

APPLICABILITY

This procedure applies to all portable information resource devices that process, contain, or have direct access to confidential information. The purpose of this procedure is to provide a set of measures that will mitigate information security risks associated with portable computing. The intended audience is all users of University information resources.

PROCEDURES

1. Where appropriate, portable computing devices shall be protected from unauthorized access by using passwords or other means.

2. All confidential or sensitive University data stored on portable computing devices, including laptops, tablets, and external storage media shall be encrypted.

3. All remote access (VPN, Remote Desktop, etc.) to University resources containing confidential information shall utilize encryption techniques when connecting from an Internet Service Provider (ISP).

4. Confidential or sensitive University information shall not be transmitted via wireless connection unless encryption methods are used.

HISTORY

Last Updated March 31, 2014

Quick Links

Need an update?

To request a change to this page or to request access to make changes yourself, email helpdesk@tamuc.edu.