Policy Number: 12-020

Mobile Computing and Storage Devices Policy

Category: Information Technology

Responsible Executive: Vice President and Chief Information Officer

Responsible Office: Vice President and Chief Information Officer


  1. Purpose To ensure secure, reliable, and accountable use of mobile computing and storage devices with University of Florida Restricted Data. This policy establishes unified management, and formally assigns roles and responsibilities for these devices.
  2. Applicability This policy applies to all mobile computing and storage devices used by the University of Florida constituency in the performance of their duties, and to all University of Florida Restricted Data when accessed through, or stored on, mobile computing and storage devices, regardless of the device’s ownership. University of Florida Restricted Data may not be released for storage on, or access through, devices that do not meet these requirements.
  3. Definitions

    Mobile Computing Devices: Small devices intended primarily for the access to or processing of data, which can be easily carried by a single person and provide persistent storage. New products with these characteristics appear frequently. Current examples include, but are not limited to, the following types of products:
  • Laptop, notebook, netbook and similar portable personal computers
  • Smartphones and PDAs (Android, Blackberry, iPhone, and others)

Mobile Storage Devices: Media that can be easily carried by a single person and provide persistent storage.  New products with these characteristics appear frequently.  Current examples include, but are not limited to, the following types of products:

  • Magnetic storage devices (diskettes, tapes, USB hard drives).
  • Optical storage devices (CDs, DVDs, magneto-optical disks).
  • Memory storage devices (SD cards, thumb drives, etc).
  • Portable devices that make nonvolatile storage available for user files (cameras, MP3 and other music players, audio recorders, smart watches, cell phones).

Restricted Data: Data in any format collected, developed, maintained or managed by or on behalf of the University, or within the scope of University activities, that are subject to specific protections under federal or state law or regulations or under applicable contracts. Examples include, but are not limited to medical records, social security numbers, credit card numbers, Florida driver licenses, non-directory student records, research protocols and export controlled technical data.

4. Policy Statement All mobile computing and storage devices that access the University of Florida Intranet and/or store University of Florida Restricted data must be compliant with University of Florida Information Security Policies and Standards.

  • Restricted Data stored on mobile computing and storage devices must be encrypted.
  • Any and all mobile computing devices used within the University of Florida information and computing environments must meet all applicable UF encryption standards. Mobile computing devices purchased with University of Florida funds, including, but not limited to contracts, grants, and gifts, must also be recorded in the unit’s information assets inventory.
  • University of Florida information security policies applicable to desktop or workstation computers apply to mobile computing devices.

Additional Resources


Mobile Computing and Storage Devices Standard

Purpose

To establish standards for the use of mobile computing and storage devices, and to specify minimum configuration requirements for them at the University of Florida consistent with the Mobile Computing and Storage Devices Policy.

Standard

All mobile computing and storage devices that access, store, process or transmit University Data, regardless of ownership, must be compliant with University of Florida Information Security Policies and Standards.

  1. Encryption of data
  2.  Authentication
    1. The portable computing device must be configured to require a strong password of its user and administrator, consistent with or exceeding UF password complexity requirements. Small portable computing devices where keyboard entry is cumbersome (ex. Smartphones) may use reduced password complexity if the device is configured to allow no more than 10 failed password entry attempts before preventing use by locking for a significant amount of time or erasing all storage.
    2. The portable computing device must be configured with an inactivity timeout of not more than 30 minutes, which requires re-authentication before use. Shorter timeout durations shoold be implemented when appropriate based on risk and usage.
  3.  Disposal
  4.  Backup
    1. Users must maintain a backup or copy of data needed for UF activities, including research, teaching and business processes, when UF data are stored on a mobile computing or storage device.
  5. Physical Security

References

NIST Special Publication 800-53 revision 3: AC-19

SEC-AC-002.02 Password Complexity Standard

SEC-TS-05 Mobile Computing and Storage Devices Policy

IT Worker Reuse and Disposal Standards

Revisions

March 1, 2013: Original

March 10, 2015: Removed deadlines for encryption, consolidated encryption requirements, minor clarifications.

More Information

 


History

Revision Date Description
March 1, 2013   Policy originally adopted
Policy updated