BYOD Guidelines
The purpose of this document is to establish minimum guidelines for Bring Your Own Devices (BYOD) that connect to University resources or access University data.
- Individuals who use a BYOD device to access University Technology resources and data must abide by the corresponding Acceptable Use Policy.
- Individuals who utilize a BYOD device to access University Technology Resources are responsible for the following:
- Abiding by the requirements identified within this guideline.
- Any damages and criminal and/or civil charges resulting from the activities conducted on their BYOD device while connected to a University Technology Resource.
- Maintaining the security of their device, including but not limited to having the device up to date on patches and running a current anti-virus solution
- Any loss of data or breach of data resulting from the activities conducted on their BYOD device while connected to a University Technology Resource.
- All transactions made from their BYOD device while connected to a University Technology Resource.
- The University is not responsible or liable for the maintenance, backup, or loss of data on a personal device, including any BYOD devices that are lost, stolen, or damaged.
- It is recommended that you:
- Do not store any University Data protected or restricted data per the University Data Classification Policy on a personal device.
- Run a Supported Operating System that is patched and updated regularly.
- Run a current anti-virus solution and maintain updated virus definitions.
- Maintain and back up the personal data stored on the BYOD device.
- Employ access protection using a passcode, passphrase, fingerprint, or other.
- Report lost or stolen BYOD devices that may contain University Data.
- Change your password immediately when a BYOD device that has accessed University Data is lost or stolen.
- BYOD devices that are Jailbroken or otherwise altered to change built-in protections must not be used to access University resources and data.