Jamf Blog
July 13, 2016 by Kerry Fortman

Balance user privacy with device security in higher education

Protect users' privacy without limiting academic freedom, all while keeping your university's environment secure from potential threats.

Balance user privacy with device security in higher education
One of the tensions university IT staffs face is the dilemma between protecting user's privacy and providing academic freedom, while at the same time keeping the university's environment as secure as possible to protect against potential threats. This seems like a daunting task, but it can be done.

Start with a user-first platform
One of the great benefits of using—and managing—Mac, iPad and iPhone devices is the fact that Apple puts user privacy first. For example, Apple devices don’t require sharing user data with online services in order to use the devices. And, whether managing institutionally owned or personally owned devices, IT can provide all the access and tools that faculty and staff need without tracking private data, such as their location or their internet activity.

Device management’s crucial role
With the right device management tool in place, IT can monitor devices and enforce encryption, issue recovery keys and lock devices when stolen or lost—ensuring a user’s sensitive data doesn’t fall into the wrong hands. By encrypting devices, IT keeps university data safe and user data from being used against them.

Working together with users
The best way to ensure that privacy and protection are put in place, is by being transparent with the goals and objectives of your university’s IT security and up front with the role users play. If you maintain an IT strategy that allows users the freedom to use their devices without creating major restrictions, they are much less likely to go around the regulations put in place for their own protection.

Learn more about protecting data and ensuring user privacy.

Kerry Fortman
Subscribe to the Jamf Blog

Have market trends, Apple updates and Jamf news delivered directly to your inbox.

To learn more about how we collect, use, disclose, transfer, and store your information, please visit our Privacy Policy.