System Security Standard Find out the standard ways to secure a system at UW Medicine
New Data Stewardship Training Know your Role and Responsibilities for Confidential Information
How to Encrypt Computing Devices and Electronic Data How do I encrypt?
Information Security Policies Home of the Information Security Policies
Departmental Training Materials Training materials for use in departmental education
Self Service Vulnerability Assessement Find your Vulnerabilities
Frequently Asked Questions Find Security related answers
Glossary of Terms Information Security Term Definitions
Contact the Information Security Team We are here to Help
Secure Remote Access UW Medicine Networks Team
UW Office of the CISO UW Chief Information Security Officers Website
Technology is becoming more mobile to accomodate user needs and behaviour. As computing devices become more mobile the security risk increases. This is mostly due to users downloading and accessing confidential information with these devices.
Some examples of mobile devices are:
All mobile devices have the ability to capture, store, and transmit all forms of electronic data including Restricted and Confidential information. Most modern smart phones and tablets also have the ability to automatically transmit that electronic data to sources outside of UW Medicine.
All UW Medicine workforce members that use these devices for work purposes need to understand the capabilities of their device as it relates to the transmitting of electronic data.
Did you know that:
These are just a hand full of itmes that you may not have known about. Please make sure to research apps and how to use them prior to using them at UW Medicine.
In order to help you properly secure these devices, we have created guidance specific to the most popular mobile devices currently being used at UW Medicine.
Encryption guidance for mobile devices can be found in our encryption guidance section here: Mobile Device Encryption Guidance
If you can't find guidance for the mobile device that you use and would like help securing it, please contact IT Services - Security at email@example.com