Encrypting smartphones and tablet devices

Encrypting smartphones and tablet devices

This page is about encryption of device storage. It is not about encryption apps that you might download and use for individual files.

If the storage of your smartphone, tablet or other similar device is not encrypted then it is possible for someone to access the data on the device if it is lost or stolen, or even potentially just out of your hands for a short period of time.

Encrypting the storage means that the data on the device is safe and gives time for functions such as remote wipe to be carried out.

Most smartphones and tablets are running either Apple iOS/iPadOS or Google Android. For other devices or operating system please consult the manufacturer's documentation. 

Apple iPhone (iOS) or iPad (iPadOS)

These are immediately encrypted when you set a PIN to lock the screen. A PIN is set even if you use fingerprint or face ID to unlock the device.

Android devices

Recent Android devices are encrypted by default when a lockscreen is set up. For older devices there is an option in the settings that enables you to encrypt the device. For more details, refer to the relevant manufacturer or network provider support pages for your device or contract.

Other devices: investigate "how to encrypt" before you buy

There are many tablets, smartphones and other portable devices. It is not possible to list encryption for them all here.

Whatever type of device you are considering you should investigate if it is or can be encrypted before purchase. All portable devices used to access or process University data should be encrypted. 

Other things you can do to protect mobile phones and tablet devices