MAM for professors

MAM are applications that have been configured for you to use safely at work on your mobile devices. They are specifically configured to meet the University's security requirements and protect internal data.

Hand and cellphone

Why will you need to configure MAM?

When MAM is configured, it creates a separate secured zone and automatically encrypts all data contained in University-owned applications on your mobile device. 

If your mobile device is subsequently stolen or lost, the encrypted data will not be accessible by unauthorized users. As such, MAM allows administrators to remotely wipe data contained in University-owned applications on a mobile device, regardless of where the device is physically located. 

Your personal data will remain unaffected and unseen by MAM. The University will have no capacity of accessing or securing it.

It is important to note that even if the data in these applications are remotely wiped from the device, they will remain safe and available on other Microsoft 365 products, including the web interface and your laptop. A remote wipe will simply delete the data stored on the mobile device without affecting any other storage location.

What does this mean for professors?

Once MAM is set up, professors will need to:

  • Register their devices using their Microsoft Office accounts at the university
  • Create a 6-digit PIN code
  • Optional: add a biometric authentication (FaceID, fingerprint, etc.)

Then, each time they use the university's mobile applications, professors will have to unlock them using either the PIN code or the biometric authentication they have added.

Examples of scenarios that MAM can prevent

Scenario 1

A professor forgot his phone in a café. His phone did not have a PIN or any other type of protection. The phone was taken by someone who immediately accessed the confidential data stored on the device. The phone was used to send inappropriate emails and documents to several people using the professor's account. Course documents were deleted or stolen.

Scenario 2

A professor left his phone unattended with his child who was using it to play games. The child made a mistake and sent compromising information by email, as the phone was not protected by a PIN code.

What if MAM was configured?

In both scenarios, MAM would have protected the data by preventing individuals, malicious or not, from damaging the university's data, but also its reputation and that of the professor.

Set up your MAM