Search Security site

Main menu

Device Security Requirements

Oversight: Chief Information Officer

Purpose: Standard for securing electronic devices in accordance with the University’s Security of Networked Devices Policy; this standard is also incorporated by reference in the University Data Protection Standards.

The following is a list of basic steps needed to secure electronic devices, such as desktop computers, laptop computers, tablets, smart phones, other mobile devices, and network printers. Additional steps may be important to implement depending upon the vendor operating system, the applications that operate on the device, the information stored on the device, and other factors. If your device is owned by UVa or has UVa data stored on it, you should consult your department LSP or system administrator for additional guidance. The website Health Systems Technology Security also provides helpful guidance for those whose devices are managed by HSTS.

Page Updated: 2015-02-12

Report a Security Incident

Please report any level of incident no matter how small it is. ISPRO will review and evaluate the report and provide a full investigation based on the threat.

Complete Report Form