Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) This Policy applies to all (2) This Policy applies to any ‘bring your own device’ (BYOD) or accompanying media that may be used to access the systems and data of the (3) Technology is part of the everyday life of the modern (4) (5) The purpose of this Policy is to: (6) This Policy has been informed by the NSW Government Mobility Solutions Framework and should be read in conjunction with the Information Technology Conditions of Use Policy. (7) BYOD owners should also have regard to statutory rules, policy documents and standards available in this document’s associated information tab in the (8) In the context of this document the following definitions apply: (9) This Policy must be reviewed before using a BYOD. Acceptance of the Information Technology Conditions of Use Policy also constitutes acceptance of the terms of this Policy and indicates agreement to the standard terms of use outlined in this Section. (10) Any BYOD must meet the minimum requirements set out in this Policy. (11) The responsibility to meet the minimum requirements set out in this Policy rests with the BYOD owner. (12) BYOD capabilities and profiles must match (13) BYOD users agree to provide limited authority to the (14) Users are responsible for ensuring that personal devices are adequately secured against loss or theft. (15) Users are responsible for replacing, maintaining and arranging technical support for their BYOD. The (16) Access to (17) The (18) If a BYOD is lost or stolen, and it contains (19) All (20) Users are responsible for ensuring that appropriate licensing exists for operating systems and applications running on a BYOD. (21) Users acknowledge and accept the University’s rights, and all other provisions and requirements set out in this Policy. (22) The (23) The (24) Each BYOD will be automatically registered within the (25) The Office 365 platform incorporates MDM capabilities which can enforce security configurations on a BYOD. (26) A limit may apply to the number of BYOD’s that can be registered for a single person. (27) BYOD owners will not be prevented from installing software or applications on their BYOD. However, the (28) The use of (29) While the (30) The (31) BYOD owners are responsible for supporting their own devices. The (32) The following table outlines responsibilities: (33) The (34) The (36) (37) The (38) (39) BYOD owners should check their BYOD to ensure that automated cloud backup is disabled to ensure that (40) Users should take reasonable steps to reduce the (41) The (42) BYOD Owners can de-register BYOD at any time by visiting the Office 365 portal. The BYOD may not be able to connect to Information Security BYOD Policy
Section 1 - Audience
Section 2 - Scope
Section 3 - Purpose
Section 4 - Definitions
Top of Page
Defined Term
Meaning
Application or App
Computer software designed to assist end users to carry out useful tasks. Examples of applications may include the Microsoft Office suite of products or smartphone applications such as Google Maps.
Bring Your Own Device (BYOD)
Any electronic device owned, leased, or operated by an employee, contractor, affiliate or
Data
Any and all information stored or processed through a BYOD.
Jail Broken Device
A device that has been tampered with to permit full access to the operating system, allowing the download of additional applications, extensions and themes that are unavailable through official means.
Minimum requirements
The minimum hardware, software and general operating requirements for a BYOD.
Mobile Device Management (MDM)
A solution which manages, supports, secures and monitors mobile devices.
Wipe / Wiping
A security feature that renders the data stored on a BYOD inaccessible. Wiping may be performed locally or remotely, via an MDM product, or by a system administrator.
Section 5 - Terms of BYOD Use
Section 6 - The University’s rights
Top of PageSection 7 - Requirements
Bring Your Own Device Minimum Requirements
Function
Minimum Requirement
Configuration Management
Operating Systems
A BYOD must use a legitimate, up to date, and vendor-supported operating system. This excludes ‘jail broken’ devices.
Network authentication
Network authentication is subject to the
Password protection / User authentication
A BYOD must support password, PIN or biometric authentication.
Automated Cloud Backup
Automated cloud back up must be able to be disabled.
Automatic Device Lock
A BYOD must have an automatic lock enabled.
Device hygiene
A BYOD must have appropriate and up to date anti-virus installed.
BYYOD Registration, Configuration and Management
Device Usage and Support
Support
Responsibility
Physical provisioning
BYOD owner
Replacement of defective / damaged BYOD
BYOD owner
Operating system support, including licensing
BYOD owner
Application support of BYOD, including licensing
BYOD owner
17000 IT Service Desk
17000 IT Service Desk
Backing up and restoring data and configuration settings
BYOD owner
Device connectivity / access
Responsibility
Mobile internet
BYOD owner
Home internet / broadband
BYOD owner
VPN client
17000 IT Service Desk
17000 IT Service Desk
Minimum requirements
Responsibility
Meeting the minimum requirements outlined in this Policy
BYOD Owner
Protection of University data on your BYOD
Device De-registration