Skip Navigation
Skip to Menu Toggle Button
UMGC Policy X-1.25

Mobile Device

Mobile Device 

Policy CategoryPolicy No. & TitlePolicy Owner/AdministratorEffective DateRevision NumberRevision Eff. DateReview Cycle
Information Governance, Security & Technology
Mobile Device
VP of Information SecuritySeptember 15, 2021N/AN/AEvery 2 years
  1. Purpose

    The purpose of this policy is to establish information security standards for the use of Mobile Devices to access University of Maryland Global Campus ("UMGC" or "University") Information Technology Resources.

  2. Scope and Applicability

    This policy applies to all University Information Systems and Information Technology Resources. All Users are responsible for adhering to this policy.

  3. Definitions

    Capitalized terms shall have the meaning ascribed to them herein and shall have the same meaning when used in the singular or plural form or any appropriate tense.

    Employee: University staff and faculty, including nonexempt, exempt, and overseas staff and collegiate faculty

    Data: Data is element(s) of Information in the form of facts, such as numbers, words, names, or descriptions of things from which "understandable information" can be derived.

    Information Technology Resource: Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by UMGC directly or by a third party under a contract with UMGC which requires the use of such equipment. The term includes computers, Mobile Devices, software, firmware, services (including support services), and UMGC's network via a physical or wireless connection, regardless of the ownership of the computer or device connected to the network.

    Mobile Device: Removable electronic storage devices (e.g., USB flash drives, and external hard drives) and computing devices (e.g., laptops, tablets, and cell phones).

    Personal Mobile Device: Personal Mobile Devices are user's personally owned removable electronic storage devices (e.g., USB flash drives, and external hard drives) and computing devices (e.g., laptops, tablets, and cell phones). A personal mobile device is frequently known as by the moniker "BYOD" (Bring Your Own Device).

    UMGC-owned Mobile Device: UMGC-owned Mobile Devices are removable electronic storage devices (e.g., USB flash drives, and external hard drives) and computing devices (e.g., laptops, tablets, and cell phones) owned or leased by UMGC and used by the UMGC community for business purposes.

    University: University of Maryland Global Campus (UMGC).

    User: A member of the University community, including but not limited to Staff and Faculty, and other individuals performing services on behalf of University, including Contractors, volunteers and other individuals who may have a need to access, use or control University Data.

  4. Mobile Device

    The University will identify and implement appropriate Mobile Device technologies and processes for the security of University Information Technology Resources and Data.

    1. Mobile Device Configuration

      1. All UMGC-owned Mobile Devices will be configured and managed by the University.

      2. UMGC Users who wish to use a Personal Mobile Device to access University Information Resources must comply with the following security standard:

        1. Submit a request to the UMGC Service Desk at for approval to use Personal Mobile Device to access, store or process University Data. Approvals must be obtained from the applicable University supervisor.

    2. Personal Mobile Devices must have software installed (Mobile Device Management (MDM)) that allows the University to remotely manage the device to adhere to University policies and USM IT Standards. If a User suspects that their Personal Mobile Device has been compromised (e.g., hacked), the User must cease all University related activity immediately on that device and notify the service desk.

    3. Users must comply with the University Remote Access Policy to minimize the risk of Data transmissions between a mobile device and organizational resources being logged, intercepted or changed.

    4. Reporting a lost or stolen Mobile Device

      1. The theft or loss of a mobile device or suspected breach of University Data must be immediately reported to a Supervisor, and to the UMGC Service Desk at

      2. Report the Mobile Device theft and details of the incident to the Police.

    5. Disposing of a Mobile Device

      1. UMGC- owned Mobile Devices: Return the UMGC-owned mobile device to the University for disposal.

      2. Personal Mobile Devices: Prior to disposing of a Personal Mobile Device, University Data should only be backed up onto another University system (e.g., University assigned laptop, University cloud service provider). University Data must not be stored on personal external storage devices or personal cloud storage.

    6. Support for Personal Mobile Devices is limited to configuration of security settings and connectivity to resources. The User assumes all responsibility for the Personal Mobile Device including maintenance, connectivity, and data plans.

  5. Exceptions
    Exceptions to this policy should be submitted to the VP of Information Security for review and approval. If an exception is requested a compensating control or safeguard should be documented and approved.

  6. Enforcement

    1. Any Employee, Contractor, or third-party performing duties on behalf of the University with knowledge of an alleged violation of this Policy shall notify the VP of Information Security as soon as practicable.

    2. Any Employee, Contractor, or other third-party performing duties on behalf of the University who violates this Policy may be denied access to Information Resources and may be subject to disciplinary action, up to and including termination of employment or contract or pursuit of legal action.

  7. Related Policies

    UMGC X-1.02 Data Classification
    UMGC X-1.04 Information Security
    UMGC X-1.05 Information Security Awareness and Training
    UMGC X-1.12 Acceptable Use

  8. Effective Date

    This policy is effective as of the date set forth above.