Home Information for UM Faculty and Staff Mobile Device Security What kind of IT security does your research require?
What Kind of IT Security Does Your Research Require?
Three areas of IT security should be considered for research projects involving mobile devices:
TBDBack to top
Sending sensitive data via email over the Internet has inherent security risks: data can be viewed, stolen or corrupted. This risk can be mitigated by ensuring that access to the Internet from remote locations is secure and/or protecting the data. This can be done by:
The importance of data security cannot be underestimated. While some technology is free, more sophisticated technology will come with a cost that should be recognized early in the grant proposal process. At a minimum, encryption and secure deletion should be in place. This can be done by:
S-Wire (encryptable email)
Security Shorts (safecomputing.umich.edu/tools/security_shorts.html)
Apple and Microsoft: User-accessible file and folder encryption built-in to the OS.
January 17, 2013