• Notification: Important changes to access Clinical Follow-Me-Desktop (FMD) coming – Immediate action required

    Computers used to access the clinical FMD environment will be required to have a new software product called VMWare View installed in order to access the environment after March 29, 2017. 

     

    For University Owned Computers - On March 11, 2017, the Medical School IT department is deploying the required software to most university owned computers that need this software.  If your university owned computer does not receive this software, you may visit the IT SoftStore after March 17 to request an automatic installation of the software title “FMD Client”.

     

    For Student and/or Personally Owned Computers – Please visit this link to locate instructions for downloading and installing the software on your computer.

     

    For more information, please visit this website hosted by UMMHC.

  • Notification: Important changes to access Clinical Follow-Me-Desktop (FMD) coming – Immediate action required

    Computers used to access the clinical FMD environment will be required to have a new software product called VMWare View installed in order to access the environment after March 29, 2017. 

     

    For University Owned Computers - On March 11, 2017, the Medical School IT department is deploying the required software to most university owned computers that need this software.  If your university owned computer does not receive this software, you may visit the IT SoftStore after March 17 to request an automatic installation of the software title “FMD Client”.

     

    For Student and/or Personally Owned Computers – Please visit this link to locate instructions for downloading and installing the software on your computer.

     

    For more information, please visit this website hosted by UMMHC.

Mobile Device Encryption

Mobile Device Encryption

For those mobile devices (i.e. iPhone, Android) that sync UMMS Outlook email, your mobile device will be encrypted on Friday January 20th. As the majority of mobile phones sold today are already encrypted, most of you will not notice this behind the scenes change.  

To ensure sensitive and critical data is secure and will be protected from unauthorized access, in the event of a device being lost or stolen.  All UMMS laptops, desktops and mobile devices must be encrypted as per our Encryption Policy.

Schedule for Encryption

Given the number of mobile devices that require encryption, mobile devices will be impacted during rolling deployments applied throughout the timeframe below

January 20th 2016 beginning at 9AM

What will Change:

  • If you do not have a password on your phone, you will be prompted to add one when we make the changes on our end.
  • If you select “later” - your email will not sync until you create a password.
  • If you already have a password on your phone, you won’t notice anything.
  • The device will automatically lock after 5 minutes of inactivity.
  • Number of failed log in attempts allowed is 10.

Encryption Preparation Steps:

  • Back up your mobile device.
  • If you do not have a pin, create a pin ahead of time to prepare for the pin requirement.
  • The pin requirements are:
    • Minimum 4 characters
    • No complexity requirements (i.e. the password can be all numbers, all letters, etc.)
    • The pin will never expire

Encryption for iPhones:

Apple Users:  Only those Apple users who do not currently password protect their device will be prompted to do so.  If your phone is already password protected, you will not notice anything.

For iOS devices like iPhone and iPads the encryption process occurs immediately once the password and baseline security policies are applied.

Encryption for Android Phones:

Android Users:  Once you are added to the secure group, you will receive a notification on your device.  See Android Encryption Instructions for step by step directions.

For other device types it usually takes about 1-3 hours to encrypt the device depending upon the size of the storage.  Be sure you have your Android device fully charged or plugged into the charger during the encryption process.

What is meant by “mobile device”?

Mobile devices include tablets and cell phones.

Do I have to encrypt my personal device?

All devices that access or store University data must be encrypted, regardless of ownership.  

How long does it take to encrypt my mobile device?

For iOS devices like iPhone and iPads the encryption process occurs immediately once the password and baseline security policies are applied.  For other device types it usually takes about 1-3 hours to encrypt the device depending upon the size of the storage.  Be sure you have your Android device fully charged or plugged into the charger during the encryption process.

Will encrypting my mobile device allow IT to track my location?

No, the encryption process does not enable GPS or any other options which can be used to track the location of a mobile device. Users may choose to enable GPS and applications such as "Find My iPhone" that use GPS to track device location. GPS location data and tracking applications are not available to nor supported by IT.

What do I do if my mobile device is lost or stolen?

Contact the IT Help Desk.  Your device can be wiped remotely if necessary.

By encrypting my device, will IT have access to my text messages, personal email and University email?

Personal data is not captured or monitored by IT.  The purpose of encryption to protect University data.  

What level of encryption is used?

The level of encryption is device specific.  The device type and model dictates the level of encryption.

I access UMMS email through my mobile device, but I do not want to install a PIN, how can I read my email?

After January 20th, if you chose not to install a 4-digit PIN, you will no longer receive new emails to your mobile device. You may access email from your mobile device through web mail.

▴ Back To Top