policies

Mobile Device Use

This policy applies to any mobile device supported by the Dean’s Office Computing Resource Unit (CRU) and/or any mobile device connected to the Dean’s Office subnet.


Shuka Smith

Shuka Smith

07 April 2015

Supporting a large number of mobile devices with varying types of software and user modifications can be a costly task in terms of IT staff time and resources. To ensure the integrity of the Dean’s Office data, network security, and office staff productivity, it is necessary to enact a set of mobile device use guidelines. The policy will apply to any mobile device supported by the Dean’s Office Computing Resource Unit (CRU) and/or any mobile device connected to the Dean’s Office subnet.

  • Use of Dean’s Office mobile devices constitutes consent to public disclosure of phone and billing records.
  • Only approved software may be installed and run on Dean’s Office mobile devices. A list of approved applications is available. Approval for applications not on the accepted list must be obtained from the Director of Information Technology prior to installation. Any application not on the approved list and not authorized by exception to policy is subject to immediate removal. Applications not on the supported list that are approved for installation will not receive CRU support.
  • All mobile devices supported must meet established configuration standards.Configurations will be changed periodically and updated by CRU. Installation of software and software updates will be performed periodically to maintain system standards and integrity and to keep the total cost of ownership at a minimum. Any exceptions or modifications to the standards must be approved by the Director of Information Technology.
  • Data stored on mobile devices and the use of mobile devices will be safeguarded. Mobile devices connecting to Dean's Office resources will be required to have a password to unlock the phone after a period of inactivity not to exceed 30 minutes. Devices will conform to the ability to be remotely wiped should the device be lost or stolen.
  • Mobile devices inherently store data which may be of a personal or confidential nature. This data is at risk of compromise in the event that a device is lost or stolen. If your mobile device is lost or stolen, notify CRU immediately by sending a ticket to Computing Support Requests (csrequests@caes.ucdavis.edu).We will do the following:
    • Your user account password will be changed. (Mobile devices store your password for automatic synchronization).
    • CRU will examine all e-mail in your Inbox and any synchronized files to determine if any confidential information was present. (Only mail in your Inbox or files in your Mobile My Documents folder are synchronized with your mobile device).
    • CRU will attempt a remote device wipe. (This procedure is not guaranteed to work).

The Director of Information Technology must approve changes or exceptions to the policy and has authority over decisions affecting mobile devices supported by Dean’s Office staff and/or attached to the Dean’s Office network.
This policy provides conformance to the UC Davis Cyber-Safety Program and the UCOP Business and Finance Bulletin G-46. You will be required to sign Appendix A of UCOP B&FB G-46, and it is your responsibility to be aware of your rights and obligations under the University of California, Davis, Electronic Communication Policy (P&P 310-16).

UCOP Business and Finance Bulletin: G-46, Guidelines for the Purchase and Use of Cellular Phones and Other Portable Electronic Resources
(http://policy.ucop.edu/doc/3420357/BFB-G-46)

UC Davis Electronic Communications Policy
(http://manuals.ucdavis.edu/ppm/310/310-24.pdf)

Direct questions regarding this policy to:
Adam Getchell
Director of Information Technology
(530) 752-8008
acgetchell@ucdavis.edu