Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) This document sets out the terms of use for ‘bring your own device’ (BYOD) within the (2) This procedure applies to all students, and employees, including permanent and temporary (3) This procedure applies to any device or accompanying media that may be used to access the systems and data of the (4) Technology is part of the everyday life of the modern University student and worker. Consumer technology is evolving quickly and is often more advanced than the technology available in the classroom or the workplace. (5) Students and staff increasingly prefer to use their own smartphones, tablets and other devices to access information. Empowering them to do so supports greater mobility and flexibility. (6) The purpose of this procedure is to: (7) This BYOD Procedure has been informed by the NSW Government Mobility Solutions Framework. (8) This procedure supplements the (9) Device Owners should also have regard to the statutory rules, policy documents and standards available in the associated information tab of this policy. They provide direct or related guidance for the use of technology and the collection, storage, access, use and disclosure of data by the (10) This procedure must be reviewed before using any BYOD. Acceptance of the Information Technology Conditions of Use Policy also constitutes acceptance of the terms of this BYOD Procedure. (11) Acceptance indicates agreement to the following standard terms: (12) The table below summarises the (13) Each BYOD will be automatically registered within the (14) The Office 365 platform incorporates MDM capabilities which can enforce security configurations on BYOD. (15) A limit may apply to the number of devices that can be registered. (16) Device owners acknowledge that: (17) Device Owners will not be prevented from installing software or applications on their device. However, the (18) The use of (19) The (20) Device Owners are responsible for supporting their own devices. The (21) The (22) The (24) Device Owners are responsible for abiding by all license terms and conditions applicable to any software, apps, or data provided by the (25) While the (26) If your BYOD is lost or stolen, you are responsible for reporting the event as soon as practicable to the 17000 IT Service Desk on +61 2 492 17000. (27) (28) (29) You should check your BYOD to ensure that automated cloud backup is disabled. This is to ensure that (30) You should take reasonable steps to reduce the (31) You are responsible for backing up and restoring the data and configuration settings of your BYOD. (32) The (33) The (34) Device Owners can de-register BYOD at any time by visiting the Office 365 portal. The device may not be able to connect to (35) Device Owners are encouraged to wipe or remove personal data from devices before being disposed, sold or gifted.Information Security BYOD Procedure
Section 1 - Audience
Section 2 - Scope
Section 3 - Purpose
Definitions in the Context of this Procedure
Defined Term
Meaning
Application or App
Computer software designed to assist end users to carry out useful tasks. Examples of applications may include the Microsoft Office suite of products or smartphone applications such as Google Maps.
Bring Your Own Device (BYOD)
Any electronic device owned, leased or operated by an employee, contractor, affiliate or
Data
Any and all information stored or processed through a BYOD.
Device hygiene
BYOD must have appropriate and up-to-date ‘hygiene’ solutions such as anti-virus software installed.
Minimum requirements
The minimum hardware, software and general operating requirements for a BYOD.
Mobile Device Management (MDM)
Solution which manages, supports, secures and monitors mobile devices.
Wipe
A security feature that renders the data stored on a device inaccessible. Wiping may be performed locally or remotely, via an MDM product, or by a system administrator.
Related Documents
Section 4 - Terms and Conditions of BYOD Use
Top of PageSection 5 - Requirements
Bring Your Own Device Minimum Requirements
Function
Minimum Requirement
Configuration Management
Operating Systems
BYOD must use a legitimate, up to date, and vendor-supported operating system. This excludes ‘jail broken’ devices.
Network authentication
Network authentication is subject to the
Password protection / User authentication
BYOD must support password, PIN or biometric authentication.
Automatic Device Lock
BYOD must have the automatic lock enabled.
Device hygiene
BYOD must have appropriate and up to date anti-virus installed.
Lost and stolen devices
If a BYOD is lost or stolen, and it contains
Mobile device disposal
All
Software licensing
Users are responsible for ensuring that appropriate licensing exists for operating systems and applications running on BYOD.
Security Management
Mobile device management (MDM)
The
Service Management
BYOD authority
Where a device is used for BYOD, and contains
Mobile device application control
The
Device Support
Each user is responsible for the management and support of their own BYOD. Refer clause (22).
Device Registration, Configuration and Management
Device Usage and Support
Support
Responsibility
Physical provisioning
Device owner
Replacement of defective / damaged device
Device owner
Operating system support including licensing
Device owner
Application support of device including licensing
Device owner
17000 IT Service Desk
17000 IT Service Desk
Device connectivity / access
Responsibility
Mobile internet
Device owner
Home internet / broadband
Device owner
VPN client
17000 IT Service Desk
17000 IT Service Desk
Protection of University data on your BYOD
Device De-registration