Devices such as smartphones and tablets are mobile computers and so, are exposed to the same virus and malware risks as computers. You should take care to ensure that you only install software from trusted developers, hosted on trusted app stores (e.g. Google Play, Windows Store & App Store).
These devices are also an attractive target for thieves so keep your personal belongings safe. If you do lose your device or are the victim of theft, there are steps you can take to protect your information.
If you connect smartphone or tablet to the Imperial College London network or use one to access College systems and data, whether personal or College-owned, you are responsible for following the policy and keeping data secure. If you are a member of staff using your personal device for College business, you are fully responsible for ensuring the security of that information and you may be breaching College's Information Systems Security Policies.
Information on how to protect mobile devices
- Use a PIN and back up information
- Encrypt your mobile device
- Report a stolen device
- Track your device using software
- Delete data from your device remotely
- Imperial policy for mobile device use