Mobile Tablet Devices
|
|
- Howard Jordan
- 8 years ago
- Views:
Transcription
1 Document Owner: Page 1 of 5 Mobile Tablet Devices Purpose The purpose of this document is to provide guidance for the appropriate purchase and usage of Mobile Tablet Devices (devices running ios and Android OS). Scope This document sets recommendations for the purchase, operation, and support of Mobile Tablet Devices for University of Central Missouri employees. This document covers portable tablets capable of transmitting packet data either directly (through UCM s wireless network) or via connection to another network service (e.g. Wi-Fi hotspot or cellular service). Overview The Office of Technology department strives to provide the best customer service possible to all members of the university community, within available limited resources. The Office of Technology has responsibility for recommending requirements for mobile tablet devices used at UCM. The Office of Technology s responsibility is to provide stewardship guidelines, manage University risk, and assess the impact these devices can have on the operation of UCM s infrastructure and the information stored therein. Procedure Tablet Devices Tablets also known as slates or pads use virtual keyboards on touch sensitive screens as the primary interface method. Examples of Tablet Pads include ipad, Xoom, G-Slate, Galaxy Tab, etc. Services All services used are to be, first, for university business purposes and may be used for personal use within conditions outlined by the owning department. Selection and Purchase Recommendations for Mobile Tablet Devices will be set by the Office of Technology and reviewed each year with attention given to cost, business functionality, service availability, software compatibility, software licensing, supportability, and security. The reviews will recommend models, vendors, related 1 Mobile Tablet Recommendation for Use UCM
2 Document Owner: Page 2 of 5 service providers, and common software packages approved for use with these devices. At this time, currently deployed tablets include ipad, ipad2, Samsung Galaxy, and the Motorola Xoom. Purchase of devices not currently recommended by the Office of Technology will require coordination with the department and the Office of Technology to determine the proper support model for a new device. Delays may be encountered when purchasing items not currently recommended as units will require testing against UCM s infrastructure. Usage Given that Mobile Tablet Devices may be storing and transferring critical UCM data while connected to the internet, all University Policies and procedures regarding data, communication, and security (Acceptable Use, , etc.) are applicable. Mobile Tablet users are strongly recommended to password protect access to stored information and take precautions to ensure the device is not lost or stolen. Apps If a particular application is found to be causing problems with the UCM Network for whatever reason; the Office of Technology may take steps to limit the use of that software on campus. Use of Apps is outlined below: 1. Apps purchased with university funds: Are not transferrable to personally owned devices Requires approval for download from Budget Managers 2. Apps purchased with personal funds: May be allowed with the permission from the department. The user must understand that this app may not be transferred to another university device; however, the conditions may vary with different device platforms. For instance, an application purchased may allow the user to place the app on the ipad and an iphone, but a different app may have different restrictions on multiple-device use. Reimbursements for apps will be determined by the Budget Manager Apps must be removed when the person returns the device to the university 3. Apps that are free: May be allowed with permission from the department. The user must understand that apps are specific to the device and may not be transferrable 2 Mobile Tablet Recommendation for Use UCM
3 Document Owner: Page 3 of 5 Security of data Data stored on Mobile Tablets is often at more risk than data stored on desktop computers or network shares due to the public environments that the devices can be used in and their risk of being lost or stolen. Hence, the Office of Technology recommends users refrain from storing any confidential university data on mobile devices. In addition, all data stored on Mobile Tablet devices should be backed up regularly. Due to the diversity of devices available, security and backups are the responsibility of the user. For ios devices, the Office of Technology recommends using the encrypted backup option in itunes. For other platform backup suggestions and recommendations, please contact the Office of Technology Technology Support Center. Support The Office of Technology will provide, to the best of its ability, connectivity support to the UCM network for all Mobile Tablet Devices that meet the Office of Technology s recommendations. For support of issues with specific apps, users will need to contact the developer of the app. Network Access and Support Authorized Mobile Tablet Device users will be allowed to access any Office of Technology network directly through the Wi-Fi network, which requires authentication through a web browser. To ensure the security of UCM s networks, the Office of Technology recommends shutting off ad-hoc detection on their Mobile Tablet Device. Department Responsibility Personnel receiving a mobile tablet should agree to and sign a document which outlines usage agreement (sample document attached). The document is owned and maintained by the department and a copy of the document forwarded to the Office of Technology for inventory management. Personnel receiving a mobile device should understand that the device is, first, for university use, and, second, can be used for personal use with conditions outlined by the department. Once an employee s employment with the university has been terminated, the manager/supervisor is to immediately notify the Office of Technology Technology Support Center so that the service can be suspended if necessary. It is also the manager/supervisor s responsibility to obtain all Mobile Tablet Devices that are the property of UCM before the employee departs the University. If another employee (replacement employee) will take over the device/service, it is the responsibility of the supervisor to ensure that all data be removed from the device before transitioning the device to another employee. Most units have a factory reset option that is useful to remove all data and reset the device to 3 Mobile Tablet Recommendation for Use UCM
4 Document Owner: Page 4 of 5 manufacturer defaults. See the software section above for any impact to continued use of software on the device as transference of license is usually not possible. Loss or Theft of Devices Upon the loss or theft of a university owned Mobile Tablet Device the employee must file a report with Public Safety and forward a copy of the report to the Office of Technology Technology Support Center. It is highly recommended that employees install software/utility that can be used to wipe or lock the data and profile from Mobile Tablet Devices if the device is lost or stolen. Some devices incorporate a password feature that will automatically lock the tablet after several unsuccessful password attempts. This software/utility differs from device to device; the Office of Technolgy Technology Support Center will attempt to find the appropriate solution for each device. If an employee should lose or damage a Mobile Tablet Device that is out of warranty or not covered by insurance, and/or if the department fails to collect the device from the employee upon separation from UCM, the department will be responsible for the full payment to repair or replace the device. The Office of Technology does not own the devices, nor does the Office of Technology bear any responsibility to replace or repair the devices in the event of theft, loss, or damage. 4 Mobile Tablet Recommendation for Use UCM
5 Document Owner: Page 5 of 5 Mobile Tablet Use Agreement I, acknowledge that as a UCM employee I am in receipt of this Mobile Tablet, (make, model, serial number) and that it is the property of the University of Central Missouri. I further acknowledge that this Mobile device, as a single user device, is my sole responsibility; and that: Any applications loaded to this device becomes the property of UCM and is nontransferrable All applications installed on this device and paid for by UCM will go through the approval process as established by the Department Any applications, free or for fee, I install for my personal use remain with the device or is deleted from the device before I return the device back to UCM Any charges incurred while connecting to the Internet with this device are my sole responsibility I have read, understand, and agree to the Mobile Tablet Use document and the conditions outlined above. Printed name: Signature: Date: File copy: Department Office of Technology Inventory Management 5 Mobile Tablet Recommendation for Use UCM
Students Mobile Messaging Registration & Configuration
Rutgers Biomedical and Health Sciences (RBHS) has implemented security controls to be applied to all mobile devices (Smart Phones and tablets) that contain RBHS (NJMS) email. These controls have been established
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationNBT Bank Personal and Business Mobile Banking Terms and Conditions
This NBT Bank Mobile Banking terms and conditions will apply if you use a mobile device to access our Mobile Banking service. When you use NBT Bank s Mobile Banking service, you will remain subject to
More informationSpring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
More informationMobile Security Standard
Mobile Security Standard Title Mobile Security Standard Mobile Device Security Category Version: 18/07/2013 PUBLISHED Author:, IT Services Contact: itsecurity@contacts.bham.ac.uk Mobile Security Standard
More informationVodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
More informationInformation Systems. Connecting Smartphones to NTU s Email System
Information Systems Connecting Smartphones to NTU s Email System Connecting Smartphones to NTU s Email System Contents Things to be aware of before you start 3 Connecting a Windows Mobile 6 (6.0-6.5) Phone
More informationSysAid MDM User Guide for Android
SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction
More informationGlobal Mobile Technologies Guide for Zenprise Enrollment for IOS devices (ipad, iphones)
Global Mobile Technologies Guide for Zenprise Enrollment for IOS devices (ipad, iphones) As part of Sony Pictures commitment to enabling our workforce with the best technology and related tools available,
More informationSysAid MDM User Guide for ios
SysAid MDM User Guide for ios Table of Contents Introduction Enrolling Your ios Mobile Device in SysAid MDM Unenrolling Your ios Mobile Device from SysAid MDM Have Any Questions? Introduction SysAid Mobile
More informationMobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
More informationMcAfee Multi Access from ø. Step-by-step guide to protecting your devices. Always.
McAfee Multi Access from ø Step-by-step guide to protecting your devices. Always. Contents 3 Welcome to McAfee Multi Access 5 Setting up your Windows PC Setting up McAfee Multi Access on your Windows PC
More informationQuick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationHow To Use The Elena Mobile App
Instructions for field-testing the elena mobile app ***Field testing begins on 1 October and runs through 15 November, 2015*** Instructions on how to download and use the elena mobile phone application
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationAndroid support for Microsoft Exchange in pure Google devices
Android support for Microsoft Exchange in pure Google devices Note: The information presented here is intended for Microsoft Exchange administrators who are planning and implementing support for any of
More informationM O B I L E C O L L A B O R A T I O N S O L U T I O N S
BUREAU OF ENTERPRISE SYSTEMS AND TECHNOLOGY ENTERPRISE SERVICE DESCRIPTION FOR UNIFIED COMMUNICATIONS M O B I L E C O L L A B O R A T I O N S O L U T I O N S January 2015 V2.00 D E P A R T M E N T O F
More informationmcashier User Guide To accept payments To cancel a payment
mcashier User Guide To accept payments 1. Enter the purchase amount in the app. If desired, you can enter a reference under the amount (e.g. the product name). The reference will appear on the receipt.
More informationAndroid 4.0.4 Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies
Android 4.0.4 Support on Galaxy Nexus, Nexus S, and Motorola Xoom for Microsoft Exchange Policies Overview Requirements Supported Information Services Supported Security Policies Require password Require
More informationSophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011
Sophos Mobile Control User guide for Apple ios Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on an Apple iphone... 4 3 Set up
More informationMIDDLESEX SAVINGS BANK ONLINE BANKING AGREEMENT
MIDDLESEX SAVINGS BANK ONLINE BANKING AGREEMENT 1. Online Banking This Agreement made between you and Middlesex Savings Bank (the "Bank") governs the use of Online Banking services (the "Service"). The
More informationMobile Operating Systems & Security
Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens
More informationHow To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
More informationEnterprise Analytics. (Also known as Pyramid Analytics or BI Office) Mobile Device Support
Enterprise Analytics (Also known as Pyramid Analytics or BI Office) Mobile Device Support Mobile Device Support Overview Enterprise Analytics provides mobile support for ios, Android and Windows Phone.
More informationCOLORADO STATE UNIVERSITY SYSTEM
Board Policy: The purpose of this ipad Usage Policy is to establish guidelines and procedures for staff and Board members of the Colorado State University System (CSUS) to implement the efficient use of
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationMobile Device Usage and Agreement Policy
Page 1 of 10 1.0 Introduction Mobile Device Usage and Agreement Policy The State of Minnesota provides several electronic tools for employees whose job performance requires or would be enhanced by their
More informationWind River Financial iprocess Setup Guide for IOS Devices
Wind River Financial iprocess Setup Guide for IOS Devices (Requires ios 4.3 or later. Compatible with iphone, ipad, and ipod touch. This app is optimized for iphone 5.) Table of Contents (Clickable Links):
More informationTechnoLabs Software Services Pvt Ltd. Enterprise Mobility - Mobile Device Security
Enterprise Mobility - Mobile Device Security Story Context: TechnoLabs has been focusing and offers Enterprise Mobility as one of its solution offering. No can deny the fact that mobile computing can bring
More informationMobileConnect. Getting Started Guide
MobileConnect Getting Started Guide 1 Table of Contents Compatible Device List! 3 Operating Systems, Applications, & Personal Computer Devices:! 3 Mobile Devices & Mobile Operating Systems:! 3 Setting
More informationSophos Mobile Control User guide for Apple ios. Product version: 4
Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set
More informationMOBILE BANKING. Why should I use Mobile Banking?
MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data
More informationBasic Using HSBC Mobile Banking Technical Information
Basic What is Mobile Banking? How is Mobile Banking different to Internet Banking? How do I access Mobile Banking? Does Mobile Banking work with a post-paid or pre-paid mobile line? How much does Mobile
More informationQuickstart Guide Vodafone Mobile Wi-Fi R216-Z
Quickstart Guide Vodafone Mobile Wi-Fi R216-Z Welcome to the world of mobile communications 1 Welcome 2 Device overview 3 Getting started 5 Mobile Wi-Fi Web app 6 Web app overview 7 Current network panel
More informationFrequently Asked Questions. Troubleshooting
Frequently Asked Questions & Troubleshooting What is DisplayNote? DisplayNote is versatile, multi-platform, collaboration and annotation software, combining both the presentation aspects of interactive
More informationSecuring Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
More informationBring Your Own Device (BYOD)
Bring Your Own Device (BYOD) Looking for more on BYOD? Ask your school or go to the GCPS website. In Gwinnett County Public Schools, more and more instructional activities can be enhanced when students
More informationBring Your Own Device. Individual Liable User Policy Considerations
Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations
More informationPolicy for Staff and Post 16 Student BYOD (Bring Your Own Device)
Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...
More informationBYOD Policy for [AGENCY]
BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein
More informationService Level Standard
Service Level Standard Personal Devices Revision History Date Version Changes 2/17/2012 1.00 Initial Draft Special Note: Service Level Standards will be reviewed and updated following the end of the spring
More informationPARK UNIVERSITY. Information Technology Services. VDI In-A-Box Virtual Desktop. Version 1.1
PARK UNIVERSITY Information Technology Services VDI In-A-Box Virtual Desktop Version 1.1 I N F O R M A T I O N T E C H N O L O G Y S E R V I C E S VIRTUAL DESKTOP USER MANUAL Park University 8700 NW River
More informationMobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
More informationMobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
More informationKen Delaney Technology and Management Directions for Smartphones and Tablets
Gartner Webinar 4/7/11 Ken Delaney Technology and Management Directions for Smartphones and Tablets Attempts by businesses to ban, discourage and control the use of these devices have been unenforceable.
More informationLowanna College 2015 BYOD PROGRAM AGREEMENT. BYOD Program 2015. BYOD Student Agreement/Acceptable Use Policy/Online Services Policy
BYOD Program 2015 BYOD Student Agreement/Acceptable Use Policy/Online Services Policy The student and parent/guardian must carefully read the above contract before signing it. Any questions should be addressed
More informationMOBILE BANKING USER GUIDE
MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees
More informationMobile App User's Guide
Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure
More informationNortheast Bank Mobile Deposit Service FAQ
Northeast Bank Mobile Deposit Service FAQ What is Northeast Bank Mobile Deposit? What items can be deposited via Northeast Bank Mobile Deposit service? What items cannot be deposited through Northeast
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationBring Your Own Device (BYOD) Policy
Bring Your Own Device (BYOD) Policy Purpose is committed to supporting student learning experiences within a highly functioning environment. Our classrooms are reliant on a range of leading-edge technologies
More informationMS ipad Acceptable Use Policy (AUP) 2015-2016
Introduction Monte Vista provides network and technology resources to enrich the academic experience of students, faculty and staff. Our 1:1 ipad program is a natural extension of our mission to be a premiere
More informationNHSmail mobile configuration guide Apple iphone
Only the Apple iphone 3GS and iphone 4 support encryption at rest. The iphone 3G and iphone 2G will not connect to NHSmail NHSmail mobile configuration guide Apple iphone Version: V.6 Date: November 2011
More informationQuickstart Guide Vodafone Mobile Wi-Fi R209-Z
Quickstart Guide Vodafone Mobile Wi-Fi R209-Z Welcome to the world of mobile communications 1 Welcome 2 Device overview 3 Getting started 5 Mobile Wi-Fi Web app 6 Web app overview 7 Current network panel
More informationHow can I protect against the loss of my ID if my device is lost or stolen?
How can I protect against the loss of my if my device is lost or stolen? If your mobile device is stolen or lost, you can reactivate your user on a new device and deactivate it on your stolen or lost device.
More informationGuidelines. I. Purpose. A. Ownership and Responsibilities
MDM Guidelines I. Purpose The purpose of these guidelines is to establish mobile device management standards for securing college owned mobile devices. College owned devices are defined as any smart device
More informationE-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
More information1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
More informationMobile Device Security Is there an app for that?
Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach
More informationSUPPORTING SCHOOLS AND STUDENTS TO ACHIEVE
SUPPORTING SCHOOLS AND STUDENTS TO ACHIEVE Test Readiness & Technology Requirements 2016 Regional Training Presented by AIR and the Idaho State Department of Education Support Materials idaho.portal.airast.org
More informationThank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.
Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using
More informationMobile Health Apps 101: A Primer for Consumers. myphr.com
Mobile Health Apps 101: A Primer for Consumers just think APP This guide is designed to help you understand and make educated decisions about using mobile health applications ( app ). When considering
More informationFAQ ICE mobile FAQ February 2014 Page 1
ICE mobile FAQ February 2014 Page 1 I have an existing WebICE ID. How do I start using ICE mobile? On your iphone and ipod touch simply download the ICE mobile application from the Apple App store. For
More informationUser Guide Vodafone Pocket WiFi 4G. Designed by Vodafone
User Guide Vodafone Pocket WiFi 4G Designed by Vodafone Welcome to the world of mobile communications 1 Welcome 2 Device overview 3 Getting started: setup 4 Getting started: use 5 Pocket WiFi online dashboard
More informationEZ RMC Remote HMI App Application Guide for ios
EZ RMC Remote HMI App Application Guide for ios The EZ RMC Remote HMI App is an application designed for your ios devices to enable the monitoring and control of your EZTouch HMIs from EZAutomation.net.
More informationWashwood Heath Academy Use by staff of private communication devices policy
As a learning community, Washwood Heath Academy wants all staff and students to be able to be safe users of ICT and all data storage. The development of responsible, independent users is a prime aim of
More informationOWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
More informationBES10 Self-Service. Version: 10.2. User Guide
BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create
More informationEXTENDING ORACLE WEBCENTER TO MOBILE DEVICES: BANNER ENGINEERING SUCCEEDS WITH MOBILE SALES ENABLEMENT
EXTENDING ORACLE WEBCENTER TO MOBILE DEVICES: BANNER ENGINEERING SUCCEEDS WITH MOBILE SALES ENABLEMENT Kellie Christensen, Banner Engineering ABSTRACT This white paper details Banner Engineering successful
More informationUser Guide Vodafone Pocket WiFi Pro. Designed by Vodafone
User Guide Vodafone Pocket WiFi Pro Designed by Vodafone Welcome to the world of mobile communications 1 Welcome 2 Device overview 3 Getting started: setup 4 Getting started: use 5 Pocket WiFi online dashboard
More informationSingle Product Review: Kaspersky Small Office Security 4
Kaspersky Lab Single Product Review Kaspersky Small Office Security 4 Language: English June 2015 Last Revision: 30 th June 2015-1 - Introduction Kaspersky Small Office Security 4 is a security package
More informationBYOD Mobile Device Chart
BYOD Mobile Device Chart Grove City Christian School Bring Your Own Device The chart below describes many mobile devices, their features, and how they can be useful for teaching and learning. While it
More informationGO!Enterprise Mobile Device Management ios Release Notes
GO!Enterprise Mobile Device Management ios Release Notes GO!Enterprise MDM Version 3.9.1 GO!Enterprise MDM for ios Release Notes 1 Table of Contents GO!Enterprise MDM for ios Release Notes 4 Revision History
More informationMobile Banking FAQ for Business
Mobile Banking FAQ for Business General Questions 1. What is National Bank of Arizona Business Mobile Banking? Mobile Banking provides anytime access to your eligible account(s) from select mobile phones
More informationSystem Requirements for Online Testing
System Requirements for Online Testing Updated 7/8/2014 Overview This document was developed by the American Institutes for Research (AIR) and the Florida Department of Education and contains technology
More informationTelkomInternet APN Device Settings
TelkomInternet APN Device Settings Page 2 of 32 1. Telkom Devices 1.1. Huawei Mobile WiFi E5330 setting Switch the device on Connect the device using the USB cable Using your web browser, go to http://192.168.8.1
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise
More informationElectronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security
Electronic Communication In Your Practice How To Use Email & Mobile Devices While Maintaining Compliance & Security Agenda 1 HIPAA and Electronic Communication 2 3 4 Using Email In Your Practice Mobile
More informationDISH PAPERLESS AGREEMENTS APP
DISH PAPERLESS AGREEMENTS APP ONE APP FOR ALL YOUR PAPERLESS AGREEMENTS With the DISH Paperless Agreements app, you can electronically submit new and existing customer agreements from a compatible mobile
More informationFeature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization
More informationMobile Device Support Model
[Type here] Mobile Device Support Model This document defines the level of support the university offers for mobile devices. Mobile devices are defined as portable handheld devices such as smartphones
More informationUNC School of Dentistry Personally-Owned Computing Device Policy (BYOD)
UNC School of Dentistry Personally-Owned Computing Device Policy (BYOD) Purpose of Policy Introduction To establish how SoD faculty, staff and students will use and access the dental school s information
More informationMobile Online Banking
Mobile Online Banking User Guide Table of Contents Enrolling Through Traditional Online Banking, pg. 2 Enrolling Using Your Mobile Device, pg. 4 Login Screen, pg. 7 Locations, pg. 7 Mobile Browser View,
More informationios Education Deployment Overview
ios Education Deployment Overview ipad brings an amazing set of tools to the classroom. Teachers can easily customize lessons with interactive textbooks, rich media, and online courses. And students stay
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
More informationConditions for Provision of Closed Circuit Television Service Service Schedule Redcare View
The provisions of this Service Schedule are in addition to the Conditions for Provision of Closed Circuit Television Service (the Conditions ) and the Customer s acceptance as a user of the terms of the
More informationConfiguring an Android device to access Staff Wi-Fi and Email.
Information Services Revised 15.10.15 ISD Customer Services Configuring an Android device to access Staff Wi-Fi and Email. Screenshots provided from Google Nexus, Android version 4.2.1 Jelly Bean. Important
More informationINTRODUCTION OF IPAD USE AT UT. Introduction of ipad use at the University of Twente... 1. Content... 1. 1. Introduction... 2
CONTENT INTRODUCTION OF IPAD USE AT UT Introduction of ipad use at the University of Twente... 1 Content... 1 1. Introduction... 2 2. BEFORE YOU GET STARTED... 2 3. Setting to work... 2 3.1. Purchase...
More informationA Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools
A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years
More informationCommack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices
Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices This allows district staff and students to access the Commack UFSD network from home or anywhere
More informationQuickstart Guide Vodafone Mobile Wi-Fi R207
Quickstart Guide Vodafone Mobile Wi-Fi R207 Welcome to the world of mobile communications 1 Welcome 2 Device overview 3 Getting started 5 Mobile Wi-Fi Web app 6 Web app overview 7 Current network panel
More informationAirWatch for Android Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
More informationHow To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device
Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...
More informationApple Pay Questions & Answers
Apple Pay Questions & Answers Member FDIC Welcome Questions and Answers About Apple Pay Thomaston Savings Bank is pleased to announce that its customers may now use Apple Pay to make purchases with their
More informationRESPONSEWARE FOR ANDROID PARTICIPANTS
ResponseWare for Android Participants Guide 1 RESPONSEWARE FOR ANDROID PARTICIPANTS ResponseWare turns a participant's web-enabled mobile device or tablet into a virtual clicker. Participants are able
More informationWindows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
More informationUAMS Cell Phone Changes
UAMS Cell Phone Changes When Ordering - Effective April 18 th When Billing - End of June What Cell phones, aircards and ipads w/3g service (not foundation funded devices) What All phones stay with current
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
More informationBring Your Own Device (BYOD) Policy - Students SDS-22
Sculptor Charter School Bring Your Own Device (BYOD) Policy - Students SDS-22 SUBJECT: Bring Your Own Device Policy RESPONSIBLE UNIT: Information Technology REFER QUESTIONS TO: Information Technology EFFECTIVE
More information