Procedure: Bring your own device
- Authorised users may bring their own device to access or connect to the University’s IT services, data and networks, provided they meet the obligations of this procedure.
- This procedure applies to all users and all devices that connect to the ANU network, other than ANU owned, leased or supported devices.
- Devices which are specifically designed for network access, such as switches, WiFi access points and hubs may not be attached to the University’s network infrastructure.
- The University aims to make ANU systems and interfaces accessible across a wide range of devices and platforms however cannot guarantee that any particular combination of system and device will operate.
- Access to any highly sensitive University data is vested in the relevant system owner. System owners may change or restrict access to data from devices that are not University owned at their discretion.
- The University reserves the right to inspect and verify that University data has been removed from the device at the end of its use within the University environment or when a device is at end of life.
- The University may perform a remote wipe of ANU data in order to prevent unauthorised access.
- By choosing to BYOD, the user gives consent for the University to interrogate such devices to ensure appropriate use, as defined by the Acceptable use of information technology policy and the Information technology security policy.
- The University is not responsible for any damage or loss that occurs to any personal device.
- Limited support may be provided to assist users in accessing University systems and services.
- Users who choose to BYOD must:
- ensure that the operating system, firmware and installed software is obtained from an authorised source, is up to date and that required security patches have been applied to protect against known vulnerabilities;
- employ security solutions where available, including anti-virus, firewall and threat intelligence capabilities;
- not perform system administration of any University enterprise system using a BYOD device, without prior approval from the system owner. System administration tasks are those performed by users with privileged or elevated access;
- not store highly sensitive data on non-University owned devices, as stated in the Infrastructure security classification standard;
- remove or transfer all University data from the device or associated storage when no longer required or when the device is decommissioned;
- perform regular data backups of all University data;
- immediately inform the ITS Cyber and Digital Security Team if any personal device carrying University data is lost or stolen by emailing firstname.lastname@example.org;
- assume sole responsibility for operating system, the device and any personal applications running on the device;
- ensure the software and services being used on the device for work related to the University are compliant with the conditions of use specified in the software license or within any license agreement between the University and the vendor;
- ensure the device supports password or pin authentication and that this is enabled; and
- ensure that the device has the automatic lock enabled.
|Printable version (PDF)|
|Title||Bring your own device|
|Purpose||This procedure defines the obligations for all authorised users who choose to connect a personally owned device to the University’s network or who use their personal device to access the University’s Information Technology (IT) services, data and networks. This procedure aims to protect University systems and data from unauthorised access, use or disclosure.|
|Audience||Staff, Students, Alumni, Affiliates|
|Topic/ SubTopic||Information Technology - Usage|
|Effective Date||2 Apr 2019|
|Review Date||5 Apr 2022|
|Responsible Officer||Director, Information Technology Services|
|Contact Area||Information Technology Services|
Information Infrastructure and Services Statute 2012
Information Infrastructure and Services Rule 2015
AS ISO/IEC 27002:2015
Australian National University Act 1991
Australian Government Protective Security Policy Framework
Public Governance, Performance and Accountability Act 2013
Public Governance, Performance and Accountability Rule 2014
Australian Government Department of Finance and Deregulation Finance Circular No. 2009/08
Crimes Act 1914 (Cth)
Privacy Act 1998
Telecommunications Act 1997
Telecommunications Regulations 2001