Mobile Devices


Apple iPad and iPhone Management

ITS provides management of University-owned Apple iPads and iPhones that includes device configuration and app installation of both free and paid apps. More information: Apple iPad & iPhone Management


How to Access Google on your Mobile Device

UCSC Google Calendar

The best way to access your UCSC Google Calendar on your mobile device is to open up a web browser (on the device) and login to your calendar with your CruzID and Gold password. You may also sync your Google Calendar to a third party calendar application, (Outlook - iCal - Sunbird). More information: Google Calendar Mobile Device Set Up

UCSC Google Email

The best way to access your UCSC Google Email on your mobile device is to open up a web browser (on the device) and login to your email with your CruzID and Gold password. You may also access your Google Email account using an email client, (Outlook, Apple Mail, Thunderbird). More information: UCSC Google Email Mobile Device / Email Client Set Up


UCSC Wireless on Mobile Devices

You are able to use campus wireless services on your mobile device to access campus applications and the Internet. Using your mobile device on the campus wireless is a self-supported service. More information: Wireless Network Services


Wireless Telephone Services

ITS works with a variety of wireless telephone providers to bring the campus the best connection in wireless technology. Micro cellular antennas are installed at numerous locations on campus, providing continuous campus coverage for major wireless providers.

The range of options and services is a personal choice. These wireless providers offer UCSC faculty, staff, and student discounts on phones and services. More Information


Mobile Device Security

Keep in mind that any mobile device used for UCSC business must meet all applicable security requirements.

Don't keep sensitive information or your only copy of critical data, projects, files, etc. on portable devices (such as laptop computers, CDs/floppy disks, memory sticks, PDAs, data phones, etc.) unless they are properly protected. These items are extra vulnerable to theft or loss. More security information: Security Awareness