Those in receipt of mobile devices must adhere to Mason’s Responsible Use of Computing policy and these procedures to ensure their appropriate usage.

 

Responsible Use of Computing

All users will familiarize themselves with the George Mason University’s Responsible Use of Computing policy at https://universitypolicy.gmu.edu/policies/responsible-use-of-computing/.

 

Acceptable Use

Mason-issued mobile devices shall not be used to send or download vulgar, discriminatory, or pornographic content. Users shall refrain from making any false or defamatory statements in any form or committing any other acts that could expose the University to liability. Mason’s computer systems, including the mobile device, are considered public property. The mobile device, Internet usage, and emails will be traceable to Mason, and inappropriate use can impact the reputation of Mason and the Commonwealth of Virginia.

 

Software on the Mobile Device

A user may download and maintain music and applications on their mobile device. However, the items downloaded and synced to the mobile device must comply with federal copyright laws and Mason’s policies and shall be acquired at the user's expense.


If it becomes necessary to restore a mobile device to its original condition, Mason will not be responsible for the loss of any software or data deleted due to a factory restore.

 

Loss and/or Damage of Mobile Device

It is the responsibility of the user to ensure the mobile device is kept in a reasonable and safe condition. Should a mobile device be accidentally lost, damaged, or stolen, it will be repaired or replaced according to the following:

  • Your department will pay the total number of occurrences multiplied by the cost of repair/replacement. For examplethe second lost mobile device would be two times the replacement costs; the third repair would be three times the repair costs, etc.
  •  (N x R=total) where N is the number of times and R is repair/replacement costs.

Before any mobile device can be replaced, the damaged mobile device must be returned. 

If the mobile device was lost or stolen, a police report must be filed with the George Mason University Police.


Mobile devices damaged or destroyed through intentional, reckless, or negligent misuse will be subject to disciplinary action.


Security of the Mobile Device

The increased flexibility and portability of a mobile device means more opportunities for data to be stolen, lost, or inadvertently exposed. Users shall exercise precautions for handling, storing, and securing mobile devices. Mobile Devices should not be left unattended in unsecured locations under any circumstances.

  • A password/PIN must be used.
  • Theft Tracking Software must be used. Apple uses Find My iPad/iPhone, installed on all Facilities-issued devices.


Return of the Mobile Device

Upon separation from the University, the user shall immediately turn in their mobile device and all Mason-provided peripherals to their supervisor or appropriate designee. The user must archive and save any files needed before returning the mobile device to the University. The device will be factory restored, and ALL data will be erased upon return.