Mobile Device Center
All individuals have a personal responsibility to safeguard the integrity and confidentiality of the University's systems, data and physical facilities. Security of mobile devices and the data they hold is necessary both to honor the University's obligations to providers of data (students, staff and faculty) and to protect the University's systems and data from accidental or deliberate damage, loss or corruption. Users of mobile devices are responsible for ensuring that data and information to which they have authorized access is used only for the purpose provided and that the confidentiality, integrity and security of the data is maintained.
It is strongly recommended that you do not use your mobile device to store, process or transmit sensitive information unless you are confident that the security controls on the device are sufficient to prevent data loss or theft. All mobile devices should be configured so that entry of a password is required after a certain period of inactivity. Additional protective measures, such as erasing your data after a predetermined number of failed passcode attempts, are also recommended.
The Mobile Device Center provides general guidelines and summary information about selecting, acquiring, configuring and using mobile devices at The University of Scranton but is not intended to be all-inclusive.
Visit the Microsoft Office Install website to get up to date information.
- Make sure you know what you are downloading. Because viruses can be transferred on other attachments, only download files and attachments from trusted sources.
- Shut off Bluetooth when it is not in use. Bluetooth viruses can transfer to your device and unwanted listening can occur via Bluetooth.
- Clear your device's memory often.This will help protect information transmitted in unencrypted e-mails as well as saved usernames and passwords.
- Keep your smartphone in a safe place to protect it from loss or theft.
- Set strong passwords and reset them frequently. Using a Strong Password Generator like the one provided by pctools.com will most definitely provide you with a password that will help keep your information and communications private.
- Keep general return information in your device. If lost, it will have a better chance of being returned to you.
IT Services recommends that all smartphone/tablet users download and install a malware protection program. As mobile devices gain popularity and market share, concern over mobile malware attacks and outbreaks continues to grow. The Android platform, in particular, invites attackers to develop malicious applications designed to take advantage of platform vulnerabilities.
Smartphone/tablet users can download and install the free version of Lookout Mobile Security. Lookout Mobile Security provides security and privacy protection in the form of anti-malware protection, backup/restore options and find phone services. For more information, please refer to the Lookout Mobile Security website.Lookout Mobile Security provides a number of security and privacy protection options for Android, BlackBerry and Windows devices. Users of iOS devices can locate a lost device on a map, remotely lock or remotely wipe a device using the free Find My iPhone app. The Find My iPhone app works with Apple’s iCloud subscription service, but does not require a subscription. Find My iPhone can be installed from the App Store. Instructions for configuring Find My iPhone and iCloud are available at Apple's website.
Mobile devices can receive limited service at the following locations. When seeking assistance you or your representative must remain with the device at all times. When seeking assistance you should never be asked for nor offer to provide your email/calendar password. You or your representative should remain with the device at all times to provide password information when necessary.
When contacting your cellular service provider you may be asked about the type of email and/or calendar server in use by the University. The University of Scranton uses Microsoft's hosted Exchange solution, Office 365 for email and calendar.
Type of support
Technology Support Center
Cellular Service Provider
Devices Charged to University Budgets
Verizon Wireless is the University’s primary cellular service provider and is the recommended provider for all mobile devices. Individuals may acquire devices from other cellular service providers but should only consider doing so when Verizon Wireless coverage in a frequently visited geographic region is poorer than coverage provided by alternate providers. Cellular services provided by Verizon Wireless are more cost effective for the University than services offered by other providers. Acquiring a mobile device from a cellular service provider other than Verizon Wireless is strongly discouraged unless dictated by the provider’s coverage area.
Requests for the acquisition of devices charged to University budgets can be made by contacting the Technology Support Center at x4357 or by submitting a Royal IT Support ticket. Please note, approval for the acquisition and usage of wireless services for which a monthly service is incurred is given by the budget supervisor for the department that will incur the expense. Final approval is given by the divisional vice president.
Regardless of the advances made in mobile technologies, mobile device batteries still do not last longer than a few days. Keep in mind, however, that modern mobile devices require much more energy than the mobile devices in use just 10 years ago. Modern devices and current battery life really cannot be compared to the devices of ten years ago. For simple steps to help you prolong the overall life of the battery and make the battery last longer between charges please review the article, How to Make your Cell Phone Battery Last Longer.
Wireless carriers in the United States operate over two different networks: Code Division Multiple Access (CDMA) and Global System for Mobile Communication (GSM). Though each technology transmits voice and data, they do so in different ways, which makes them incompatible. As a result, you can't take a CDMA phone and use it on GSM or vice versa.
Of the U.S. carriers, AT&T and T-Mobile use GSM while Sprint, Verizon, and smaller carriers such as such as MetroPCS and U.S. Cellular use CDMA. Though Nextel is part of Sprint, Nextel-branded phones use a third technology called iDEN, or Integrated Digital Enhanced Network.
CDMA coverage is very strong in the United States, particularly in rural areas, but GSM service has a larger global footprint (it's the standard in Europe, for example) and GSM phones use the convenient SIM cards, which you allow you to switch phones more easily. Also, when taken on a global scale, GSM users will find a wider selection of handsets. If you travel overseas frequently GSM is the better choice. If you'll be making calls mostly in the United States, then CDMA is an equally good option. What's more, some CDMA phones now also support GSM networks for international use.
Not all mobile devices will work overseas. International access varies by country and region, by wireless carrier and by device. Additionally, internationally capable devices do not include international service. International voice/data service is an additional fee that requires activation for the duration of your travels. If you will be traveling internationally please contact your cellular service provider to determine what cellular services will be available to you for the duration of your travel and to activate the available services. Additional fees will apply.
If you will be traveling internationally with a smartphone device charged to a University budget, you will need to contact the Technology Support Center at x4357 to activate and authorize international service on your device for the duration of your trip.
- Our Services
- Technology Help
- IT Governance
- IT Assessment
- About Us