When your employment ends, hand over your phone to the Campus ICT service desk. Before returning the phone, remove accounts, screen lock, and finally reset the phone to factory settings. If needed, the Campus ICT service desk can assist with clearing the phone. Phones acquired through Netox should be returned to the Netox service desk […]
» Handing over your work phone and transferring the planTag archive: [:fi]puhelimet[:en]mobilephones[:]
Handing over your work phone and transferring the plan
– 3.4.2025
Using your work phone and plan abroad
– 3.4.2025
Before traveling, check what kind of plan your mobile device has; whether it is possible to use the phone or mobile broadband abroad and what the costs will be. You can inquire about this from ICT services (mobiilituki@oulu.fi). Depending on your destination and the duration of your trip, you might consider getting a temporary plan, […]
» Using your work phone and plan abroadPurchases: mobile devices and carrier plans
– 3.4.2025
Employer provides a mobile phone and a carrier plan to an employee when their job duties require it. If the employee works outside campuses and beyond the reach of the Eduroam wireless network, it is recommended to use the internet via the work phone. Contents of this guide: Most devices are procured as service devices; […]
» Purchases: mobile devices and carrier plansMobile phones are connected to centralized management during the ordering process
– 31.3.2025
Centralized management is a key part of phone security, manageability, and content protection. For example, through centralized management, screen lock, PIN, or access code can be enforced on the phone. Centralized management: The phone can be remotely locked or wiped if necessary (e.g., theft, loss, etc.). Technical information about the phone (software version, model, serial […]
» Mobile phones are connected to centralized management during the ordering processMobile Security Guidelines for staff members and students
– 21.3.2022
Mobile devices (smart phones and tablets) can easily get lost or stolen. Therefore, they entail the risk of unauthorised access to the user’s or university’s data. Unauthorised users can also pose as the device owner and send e-mail in his/her name. Hence, it is important to know the information security risks and act accordingly. Contents […]
» Mobile Security Guidelines for staff members and students(suomi) Tietoa älypuhelinten ja tablettien tietoturvasta
– 10.12.2018
Sorry, this entry is only available in suomi.
» (suomi) Tietoa älypuhelinten ja tablettien tietoturvasta(suomi) Kun puhelin tai muu älylaite hukkuu tai varastetaan
– 27.3.2017
Sorry, this entry is only available in suomi.
» (suomi) Kun puhelin tai muu älylaite hukkuu tai varastetaan(suomi) Numerotiedustelupalvelujen käyttö Oamkissa
– 20.3.2014
Sorry, this entry is only available in suomi.
» (suomi) Numerotiedustelupalvelujen käyttö Oamkissa