Landing page

You are here

Mobile devices

As mobile devices and smartphones have become more common, new possibilities and new challenges have arisen. One of the greatest challenges is information security, the importance of which is emphasised as the amount of data and ways of using the systems are expanding. Although the importance of technical information security must not be underestimated, a large part of information security consists of the user’s own actions. These instructions include the best practices concerning the security of smartphones. This list is not designed to be a comprehensive set of information security instructions, but more as an easy-to-read checklist of things to remember.

Implementation of a smartphone

Remember that the use of the university’s phones is governed by the terms of use as well. The phone, similar to computers, is meant to be used as a tool in studying, research and management. Minor use for personal purposes is allowed. In addition, it is important to remember that storing material that infringes copyrights in a phone or anywhere else in the university is forbidden.

When you receive your new smartphone, nearly all of its information security settings are off (except for the PIN code of the SIM card).

Instructions concerning mobile devices

Office 365 in mobile devices

Skype for Business

Information security

Information security of mobile devices. There is information on the information security of mobile devices in Helpdesk’s general information security instructions.

If your phone gets lost or stole