Information Security BYOD Procedure
Section 1 - Procedure
Audience
(1) This document sets out the
(2) It affects any device or accompanying media that you may use to access the systems and data of the
Purpose
(3) Technology is part of the everyday life of the modern University worker. Consumer technology is evolving quickly and is often more advanced than the technology available in the workplace. Employees increasingly prefer to use their own smartphones, tablets and other devices to access corporate information. Empowering them to do so supports greater workplace mobility and flexibility.
(4) The purpose of this procedure is twofold. Firstly, it aims to allow you to ‘bring your own device’ (BYOD) for business purposes. You can access
(5) This BYOD Procedure has been informed by the NSW Government Mobility Solutions Framework. The Framework assists in defining the
Terms and Conditions of BYOD Use
(6) The purpose of this procedure is to allow you to use a BYOD if you wish to do so, while also ensuring you take steps to minimise the
(7) You must review this procedure before using any BYOD. Your acceptance of the
(8) Acceptance indicates agreement to the following standard
- Acceptable BYOD – Any device may be considered for use as a BYOD providing it meets the minimum requirements set out in this document. In general, an acceptable BYOD would be one of the devices listed in the document referenced in the definition at Clause 3 of this procedure.
- Minimum requirements – The burden of proof for meeting minimum requirement rests with you, the device owner.
- Matching our requirements and your needs – BYOD capabilities and device profiles must match
University requirements as well as the scenarios where you need to use a device for work. For example, if you are usually a consumer of information when mobile, the profile of a tablet or smartphone would be a good match. If you are a ‘creator’ of information, a laptop or desktop profile would be a better match. - Authority – You agree to provide limited authority over the device for the sole purpose of protecting
University data and access on the device. This authority includes permission to wipe the device in the event of loss or disposal. This may include personal data, address books and e-mail depending on the data classification of information locally stored, the device and whether an MDM tool is used. The authority is to remain in place from the device is registered until it is de-registered. - Security – You are responsible for ensuring that your personal device is adequately secured against loss, theft or use by persons not authorised to use the device.
- Support – You are responsible for replacing, maintaining and arranging technical support for your BYOD. The
University will only provide best efforts support for any applications that theUniversity has provided and for network connection troubleshooting. - Access at
University's discretion – Access toUniversity systems and data is provided at the sole discretion of theUniversity . Your access may be revoked at any time and for any reason. - Enforcement – All breaches of this procedure will be treated seriously. If you are found to have been in breach you may be subject to disciplinary action.
Requirements
Bring Your Own Device Minimum Requirements
(9) The table below summarises the
Function | Minimum Requirement |
---|---|
Configuration Management | |
Operating Systems | Your device must use a legitimate operating system that meets the defined minimum standards (i.e. you may not use a ‘jail broken’ device). |
Network authentication | Network authentication is subject to the |
Password protection / User authentication | Your device will support password authentication and automatic locking that must be used at all times. |
Automatic Device Lock | Your device must have the automatic lock enabled. |
Device hygiene | Your device must have appropriate and up to date anti-virus and anti-spyware installed. |
Lost and stolen devices | If your device is lost or stolen you must report the loss or theft immediately to the 17000 IT Service Desk. |
Mobile device disposal | Any |
Software licensing | Operating systems and applications running on or required by BYOD will be your sole responsibility as the device owner. |
Security Management | |
Mobile device management (MDM) | The |
Service Management | |
BYOD authority | If your device is used for BYOD, and linked to the |
Mobile device application control | The |
Device Support | You and the device issuer are responsible for supporting your device. |
Device Registration, Configuration and Management
(10) Your BYOD will be automatically registered within Office 365 upon first connection to the exchange mail service.
(11) A limit may apply to the number of devices that can be registered.
(12) You acknowledge that the
- Refusal to register a device that fails minimum requirements (outlined above) or that currently has installed banned software and services listed at “What Applications are Forbidden on the UON Network?”.
- Configuring certain security settings.
- Preventing the user from changing certain security settings.
- Applying a login code with an acceptable level of complexity to enable secure access to the device.
- Automatically locking the device after an inactive timeout period (you will need to re-enter the login code).
- Installing software and digital certificates necessary to maintain security.
- Encrypting data stored on the device.
- Automatically wiping (either all code and data OR all
University code and data) depending uponUniversity MDM, device capabilities and specific requirements from the device after a specific number of failed login attempts. - Should any configurations be removed that are required for proper use of the device with
University systems, these may be re-applied or access toUniversity systems, information and data will be prevented if the configurations cannot be maintained.
(13) You acknowledge that any
(14) You acknowledge that the
(15) You understand that the University may remotely monitor your device to ensure security and software configurations are maintained.
(16) You will not be prevented from installing the software or applications of your choice on your device. However, the
Device Usage and Support
(17) The service and its use are at your sole discretion and
(18) The
(19) You are responsible for supporting your device. The
Support | BYOD |
---|---|
Physical provisioning | Device owner |
Replacement of defective / damaged device | Device owner |
Operating system support including licensing | Device owner |
Application support of device including licensing | Device owner |
17000 IT Service Desk | |
17000 IT Service Desk | |
Device connectivity / access | BYOD |
Mobile internet | Device owner |
Home internet / broadband | Device owner |
VPN client | 17000 IT Service Desk |
17000 IT Service Desk |
(20) The
(21) The
(22) You have sole responsibility for ensuring no other person has access to
(23) The
(24) The
(25) The
(26) The
(27) You are responsible for abiding by all licence
(28) You acknowledge that your use of a BYOD may involve the
- Preventing you from accessing
University ICT services - Locking your device
- Wiping personal data from your device in accordance with the following circumstances:
- Your BYOD is reported as being lost/stolen to the 17000 IT Service Desk.
- You cease employment / contract or studies with the
University . - There is a suspected security breach, examples include but are not limited to modification of the device’s operating system, breaching
University policies, or detection of viruses or malware on the device. - The
University may lock your device to prevent access toUniversity information or data. - Preventing your device from connecting to
University ICT services. - Applying either a full or selective wipe of your BYOD.
- Applying a manual selective wipe of your BYOD.
(29) While the
(30) If your BYOD is lost or stolen, you are responsible for reporting the event as soon as practicable to the 17000 IT Service Desk on +61 2 492 17000. You must also:
- undertake a device wipe as soon as practicable via the Office 365 portal or via a personal configuration / management utility.
- take reasonable steps to ensure that it is replaced as quickly as possible.
Protection of University data on your BYOD
(31)
(32)
(33) You should check your devise to ensure that automated cloud backup is disabled.
(34) You should take reasonable steps to reduce the
(35) You are responsible for backing up and restoring the data and configuration settings of your BYOD. Personal data is not to be backed up or stored by the
Device Deregistration
(36) The
(37) The
(38) You can de-register your BYOD at any time by visting the Office 365 portal at http://outlook.office.com/owa/?path=/options/mobiledevice
(39) You will no longer be able to connect to
(40) You are encouraged to remove any personal data if you are intending to dispose of your BYOD. If you intend to sell or gift the device to another person you should ensure that it is wiped.
Definitions in the Context of this Procedure
Defined Term | Meaning |
---|---|
Application | Computer software designed to assist end users to carry out useful tasks. Examples of applications may include the Microsoft Office suite of products or smartphone applications such as Google Maps. |
Bring Your Own Device (BYOD) | Any electronic device owned, leased or operated by an employee, contractor, affiliate or |
Data | Any and all information stored or processed through a BYOD. |
Device hygiene | BYOD must have appropriate and up-to-date ‘hygiene’ solutions installed. Device hygiene includes anti-virus, anti-spam and anti-spyware solutions. |
Minimum requirements | The minimum hardware, software and general operating requirements for a BYOD. |
Mobile Device Management (MDM) | Solution which manages, supports, secures and monitors mobile devices. |
Mobility Framework | The NSW Government Mobility Solutions Framework. The Framework provides information and technical guidance to agencies when procuring mobility solution services. |
Wipe | A security feature that rends the data stored on a device inaccessible. Wiping may be performed locally, via an MDM product, or remotely by a network administrator. |
Related Documents
(41) This procedure supplements the
(42) You should also have regard to the statutory rules, policy documents and standards available in the associated information tab of this policy, or listed below. They provide direct or related guidance for the use of technology and the collection, storage, access, use and disclosure of data by the
- AS/NZS ISO 31000 Risk Management – Principles and Guidelines.