Mobile phones, tablets, and wearable devices are often used to conduct personal and business communication and transactions. Everyone should do their best to secure their devices and protect their and Pitt’s information and environment. Please read the following guidelines to make sure that your devices are properly secured, regardless of whether they are University-owned or personal.