(1) ACU recognises the benefits generated by students using their own devices and is committed to supporting this practice. (2) This Policy sets out the roles and responsibilities of both the users of the devices and ACU’s in supporting them and their devices. (3) This Policy seeks to: (4) This Policy applies to all students who utilise BYOD within the ACU information technology environment and have current ACU assigned credentials. (5) The scope of IT support provided for BYOD users are: (6) In-person support is only available during the semester from the Information Technology support desk at selected campuses. To receive in-person support: (7) Additional support via online resources is available through AskACU. Information on virtual labs and software available for students’ BYOD are frequently updated. AskACU will have the latest repository for reference. (8) The University will ensure that: (9) All users of BYOD are responsible for ensuring: (10) If a BYOD has been flagged as a security risk to the ACU Network, wireless access will be blocked to the device. Impacted students will be contacted by AskACU. (11) This Policy must be reviewed every three years. The Chief Information and Digital Officer may initiate a shorter review period. (12) Unless otherwise indicated, this Policy will still apply beyond the review date.Bring Your Own Device (BYOD) Policy for Students
Section 1 - Policy Statement
Section 2 - Policy Purpose
Top of PageSection 3 - Application of Policy
Section 4 - Definitions
Term
Definition
Acceptable Device
ACU Assigned Credentials
Username and password that allows a user to access the ACU Network.
ACU Network
Agreed period
Agreed period is based on the software licensing agreement at ACU. Once a student has completed their studies at ACU, the software must be removed.
BYOD
Bring Your Own Device.
Malicious Software
Malicious software also known as Malware refers to any malicious program that causes harm to a computer system or network. Malicious software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware or rootkits. Tampered software that has been jailbroken or rooted are also considered malicious software.
Network Security Requirements
Network security requirements are defined as per the Information Security Policy and Information Security Procedure.
Portable Device
A device that can be easily carried, held and operated by hand.
Section 5 - Policy Principles
Support Arrangements for BYOD Users
There are Two Ways to Access BYOD Support for Students
In-person Support
Support through online resources
Section 6 - Roles and Responsibilities
University’s Responsibilities
User’s Responsibilities
Section 7 - Review
View Document
This is the current version of this document. You can provide feedback on this document to the document author - refer to the Status and Details on the document's navigation bar.
A portable device with a current manufacturer supported licensed operating system running either Windows, macOS, iOS, or Android, with the most recent system update available for that operating system.
ACU reserves the right to deny devices that do not meet these requirements from connecting to ACU networks and mark those devices as unacceptable.
The computing environment found within the Australian Catholic University. All wireless networks where ACU assigned credentials allow access. This can also include any use of ACU’s federated access.