Search Information Security site


Device Security Requirements

Oversight: Chief Information Officer

Purpose: Standard for securing electronic devices in accordance with the University’s Security of Networked Devices Policy; this standard is also incorporated by reference in the University Data Protection Standards.

The following is a list of basic steps needed to secure electronic devices, such as desktop computers, laptop computers, tablets, smart phones, other mobile devices, and network printers. Additional steps may be important to implement depending upon the vendor operating system, the applications that operate on the device, the information stored on the device, and other factors. If your device is owned by UVa or has UVa data stored on it, you should consult your department LSP or system administrator for additional guidance. The website Health Systems Technology Security also provides helpful guidance for those whose devices are managed by HSTS.

Page Updated: 2015-02-12

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security Office will evaluate the report and provide a full investigation.

Complete Report Form