(1)  ACU recognises the benefits generated by students using their own devices and is committed to supporting this practice. (2)  This Policy sets out the roles and responsibilities of both the users of the devices and ACU’s in supporting them and their devices. (3)  This Policy seeks to: (4)  This Policy applies to all students who utilise BYOD within the ACU information technology environment and have current ACU assigned credentials. (5)  The scope of IT support provided for BYOD users are: (6)  In-person support is only available during the semester from the Information Technology support desk at selected campuses. To receive in-person support: (7)  Additional support via online resources is available through AskACU. Information on virtual labs and software available for students’ BYOD are frequently updated. AskACU will have the latest repository for reference. (8)  The University will ensure that: (9)  All users of BYOD are responsible for ensuring: (10)  If a BYOD has been flagged as a security risk to the ACU Network, wireless access will be blocked to the device. Impacted students will be contacted by AskACU. (11)  This Policy must be reviewed every three years. The Chief Information and Digital Officer may initiate a shorter review period. (12)  Unless otherwise indicated, this Policy will still apply beyond the review date.Bring Your Own Device (BYOD) Policy for Students
            Section 1 - Policy Statement
Section 2 - Policy Purpose
	
Top of PageSection 3 - Application of Policy
Section 4 - Definitions
	
		
			 
	
	
		Term 
			Definition 
		
			 
		Acceptable Device 
			
			 
		
				
			
			 
		ACU Assigned Credentials  
			Username and password that allows a user to access the ACU Network. 
		
			 
		ACU Network 
			
			 
		
			 
		Agreed period 
			Agreed period is based on the software licensing agreement at ACU. Once a student has completed their studies at ACU, the software must be removed. 
		
			 
		BYOD 
			Bring Your Own Device. 
		
			 
		Malicious Software 
			Malicious software also known as Malware refers to any malicious program that causes harm to a computer system or network. Malicious software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware or rootkits. Tampered software that has been jailbroken or rooted are also considered malicious software. 
		
			 
		Network Security Requirements  
			Network security requirements are defined as per the Information Security Policy and Information Security Procedure. 
		
			 
	
Portable Device  
			A device that can be easily carried, held and operated by hand. 
		Section 5 - Policy Principles
Support Arrangements for BYOD Users
	
There are Two Ways to Access BYOD Support for Students
In-person Support
	
Support through online resources
Section 6 - Roles and Responsibilities
University’s Responsibilities
	
User’s Responsibilities
	
		
Section 7 - Review
View Document
    This is the current version of this document. You can provide feedback on this document to the document author - refer to the Status and Details on the document's navigation bar.
                    A portable device with a current manufacturer supported licensed operating system running either Windows, macOS, iOS, or Android, with the most recent system update available for that operating system.
			ACU reserves the right to deny devices that do not meet these requirements from connecting to ACU networks and mark those devices as unacceptable.
The computing environment found within the Australian Catholic University. All wireless networks where ACU assigned credentials allow access. This can also include any use of ACU’s federated access.