MAM for professors


MAM are applications that have been configured for you to use safely at work on your mobile devices. They are specifically configured to meet the University's security requirements and protect internal data.


Why will you need to configure MAM?

When MAM is configured, it automatically encrypts all data contained in University-owned applications. If a mobile device is subsequently stolen or lost, the encrypted data is not accessible to unauthorized users.

It allows administrators to remotely wipe data contained in University-owned applications from a mobile device, regardless of where the device is physically located. The rest of the device, including all personal data, is not affected.

It is important to note that if the data in these applications disappear from the mobile device, Microsoft 365 services remain unaffected.


What does this mean for professors?

Once MAM is set up, professors will need to:

  • Register their devices using their Microsoft Office accounts at the university
  • Create a 6-digit PIN code
  • Optional: add a biometric authentication (FaceID, fingerprint, etc.)

Then, each time they use the university's mobile applications, professors will have to unlock them using either the PIN code or the biometric authentication they have added.


Examples of scenarios that MAM can prevent

Scenario 1

A professor forgot his phone in a café. His phone did not have a PIN or any other type of protection. The phone was taken by someone who immediately accessed the confidential data stored on the device. The phone was used to send inappropriate emails and documents to several people using the professor's account. Course documents were deleted or stolen.

Scenario 2

A professor left his phone unattended with his child who was using it to play games. The child made a mistake and sent compromising information by email, as the phone was not protected by a PIN code.


In both scenarios, MAM would have protected the data by preventing individuals, malicious or not, from damaging the university's data, but also its reputation and that of the professor.

Back to top