Secure Your Windows Phone or Tablet

If you are permitted to access or maintain sensitive institutional data using your mobile device, please meet the minimum expectations below.

See Your Responsibilities for Protecting University Data When Using Your Own Devices for a complete list of your responsibilities when using your own devices to work with sensitive U-M data.

By meeting the minimum expectations below, you also protect your personal data.

Expand All Content

Settings

Require a PIN or password for access.

Look under the lock screen setting. Instructions for settings on devices running Windows may vary depending on the device manufacturer and the version of Windows you are using. Consult the online or printed documentation for your device or search Microsoft Support, Windows Phone Support, or Surface Support for specific instructions.

Set a time limit for the password of 15 minutes or less.

Look under the lock screen setting. Instructions for settings on devices running Windows may vary depending on the device manufacturer and the version of Windows you are using. Consult the online or printed documentation for your device or search Microsoft Support, Windows Phone Support, or Surface Support for specific instructions.

Turn on data encryption.

Windows phones do not support user-managed encryption at this time.

Turn on Find My Phone to help you find or remotely erase your device if it is lost or stolen.

See Windows Phone: Find a lost phone for instructions, or search the Windows Phone website for information on your specific device.

Install U-M VPN software if you expect to use untrusted networks.

Untrusted networks include guest wireless in a hotel or coffee shop. The U-M and UMHS VPNs—Virtual Private Networks—provide a secure computing experience when accessing a U-M network from a remote location or when using a wireless connection.

  • Members of the U-M community can download and install the U-M VPN or the one appropriate for their campus (UMHS users should use the UMHS VPN). See Use a Secure Internet Connection.
  • NOTE: U-M VPN works on Windows Tablets, but does not work on Windows phones

Connections

Use a secure network connection. Your cellular carrier network is the best choice.

Use your cellular carrier network and turn off wireless when you are not using it. If you use a wireless connection, make sure it is a secure wireless network, such as MWireless.

Turn on the U-M VPN if using untrusted wireless networks.

  • Check your device's documentation for instructions for turning on VPN.
  • NOTE: U-M VPN works on Windows Tablets, but does not work on Windows phones

When not using WiFi and Bluetooth, turn them off.

Management

Keep your Windows operating system updated to get the latest security updates and improvements.

Keep your apps updated to get the latest security updates and improvements.

Only install trusted market apps, such as those from the Windows Store.

  • Do not install apps from other sources unless required for your university work and approved by your department.
  • Do not download apps offered to you via email, text messages, or web links.
  • Do not install apps offered on pop-ups from third-party websites.

Do not make unauthorized modifications to your operating system.

Do not unlock or otherwise bypass device security features that prevent you from changing your operating system or gaining privileged control (or "root access") to it. (This hacking process is often called "jailbreaking" or "rooting.") You may do this only if it is required for your university work.

Be aware of where data is being stored and store sensitive university data only in approved locations.

Store and share sensitive university data using approved services that meet the requirements of regulation and policy.

  • Check the Sensitive Data Guide for services approved for use with specific sensitive data types.
  • Be aware that personal storage services should not be used to store sensitive university data, nor should these services be used to store information relating to university business.
  • Many Microsoft apps let you share files using OneDrive (Microsoft cloud storage). Do not do this if you work with sensitive university data.

If you travel outside of the U.S., be aware certain types of sensitive data cannot be accessed or maintained outside the country.

There are legal restrictions on certain sensitive data types (such as Export Control, HIPAA, and FISMA). See the Sensitive Data Guide for details.

Before you sell or give away your device, back it up then erase all content and settings.

See Reset my phone for instructions, or search the Windows Phone website for your specific device or version.

  • Keep your content and settings for your next device.
  • Prevent unwanted access from your old device.

Report security incidents.

If your device is lost or stolen and you've used it to store or access sensitive data, notify the ITS Service Center.

Additional Best Practices

Consider these additional options for enhanced security for your device and the data maintained on or accessed from it.

  • Turn off GPS/location services for apps where you do not need it.
  • Set your web browser for private browsing. In Chrome, open the Chrome menu and look for the advanced privacy settings.
  • Turn on airplane mode when you do not need to use your phone, GPS, radio, WiFi, or Bluetooth. Look for the airplane, offline, flight, or standalone mode setting.
  • Avoid using public Wi-Fi hotspots.
  • Protect yourself online. Learn about strong passwords, how to protect your identity, how to avoid phishing scams, and more.
  • Put a sticker on your computer with your name and contact information. This low-tech, practical step enables somebody to contact you if they find your lost computer.
  • Register your devices. The U-M Police Department offers a free laptop and personal electronics registration program to members of the U-M community to deter theft and assist in the recovery of stolen property.
  • Travel safely with technology. Take precautions when you are away from home to protect your privacy and the university's sensitive data.
  • Consider using mobile anti-virus products, but understand that these are relatively new on the market and are still maturing.

Related U-M Policies and Standards