Skip to main content
Main content

End-User Device Policy

Purpose

The University provides information technology to advance its educational, research, scholarship, and health care missions. To preserve the integrity of this shared environment, individuals are responsible for ensuring that the computers and devices they regularly use to access the University’s networks, services, and systems have basic security measures enabled.

The criteria below define specific steps individuals must take to appropriately secure from misuse or theft the computers and other electronic devices they regularly use for their own access to the network, as required by the University’s Acceptable Use Policy.

These criteria may not pertain to dedicated-function devices used in research, instruction, health care, telephony, building automation systems, or other activities.

Divisions, schools, and departments may also adopt their own more stringent policies regarding protection of end-user devices to supplement this Policy. If any such policy conflicts with this Policy, the terms of this Policy will apply.

Applicability

The following criteria shall apply to all end-user devices that access the University’s networks, services, and systems or are used by any person to conduct university business regardless of their ownership.

Policy

  1. On devices, where available and practicable, the device is running a supported operating system that automatically receives security updates and up-to-date security patches are installed at least monthly.
  2. On devices, where available and practicable, application updates are applied, including security updates, at least monthly.
  3. On devices, where available and practicable, anti-virus software is installed and automatic check for updates occurs at least daily.
  4. On devices, where available and practicable, a firewall is enabled.
  5. Access to the device is protected with a password, PIN, or suitable biometric alternative.
  6. Where practicable, the screen or device locks after an inactivity timeout, and a password, PIN, or suitable biometric alternative is required to unlock it.
  7. As may be requested by management or by IT Security in IT Services, the Information Security Office in the Biological Sciences Division, or the Information Security Office in the University of Chicago Medical Center, the device is secured as above, registered, and attestation is given that the above protections are enabled for it.

Device Encryption

Full disk encryption or device encryption must be enabled for all end-user devices used in, or for the purposes of, conducting University business or work. If enabling full disk encryption or device encryption is impracticable for any end-user device and the end-user device is required for the performance of an individual’s University responsibilities, then the individual may request an exception to the encryption requirement. Exceptions to the encryption requirement require the written approval of the appropriate University Dean or University Officer and the Chief Information Security Office.

Exceptions

Exceptions to the encryption policy require the written approval of the appropriate University Dean or University Officer and the Chief Information Security Officer.

Ownership

Responsible University Officer(s): Kevin Boyd, Chief Information Officer
Responsible Offices: Office of the CIO
Effective date: October 1, 2020
Last Updated: October 1, 2020

Definitions

  • End-user device: Any desktop or laptop computer, any tablet, smart phone, or other mobile device is an end-user device. “End-user device” does not include removable storage like USB flash drives.
  • Dedicated-function device: This term refers to both embedded and external devices in which a computer operates special purpose equipment, such as may occur in a research lab, core facility, clinical care devices, instructional gear, sensors, and many other circumstances. If the device is networked and also used for any non-dedicated tasks such as browsing, email, etc., it is subject to this policy.

Contacts

Questions regarding this Policy may be directed to:

IT Risk Program
itrisk@uchicago.edu
773.702.2378

Frequently Asked Questions

Who is covered by this policy?
Who is excluded from this policy?
What's the difference between a University-owned device and a personally-owned device?
My device is managed by my school or division. What actions do I need to take?
Does this policy apply to my personally-owned cellphone or tablet?
I use my personal device to do University work. Does this policy apply to me?
I want to limit the amount of University data on my end-user device. What should I do?
What is an end-user device?
What is a dedicated-function device?
Can an alternative to password or PIN be used to protect devices? Are biometric choices like fingerprints or facial recognition acceptable?
How long should an inactivity timeout period be?
Which antivirus solutions are acceptable?
Do security patches need to be installed as soon as they are available?
What full-disk encryption technologies are acceptable?
If my desktop computer, laptop, or mobile device is too old to work with disk encryption, do I need a new one?
I have other questions; how can I get answers?