IT Security: BYOD (Bring Your Own Device) Security Guide
Updated: 30 April 2020 03:36 PM
BYOD (Bring Your Own Device) Security Guide
This guide is for anyone using personally owned devices such as smart phones, tablet computers, laptops, netbooks and similar equipment, to store, access, carry, transmit, receive or use private personal or University information or data, whether on an occasional or regular basis.
A note for faculty and staff: Using a personally owned device to work with institutional data is allowed however it is required by the Information & Data Classification policy that the user encrypt any devices used for this purpose and to ensure the device has endpoint protection software installed. In addition, the confidentiality agreement all staff have signed with OCAD U (see attachment) references a legal obligation to protect institutional data which staff have access to. This guide is designed to assist you in following the policy and agreement.
It is the sole responsibility of all staff to adhere to and be in full compliance with the Information & Data Classification policy and signed Confidentiality Agreement.
It is highly important to encrypt devices (especially laptops used for work) to be in compliance. The following are instructions for encryption for laptops, mobile devices and removable devices:
Removable Media (such as a USB key)
In addition, to be in compliance please follow these standard practices for personal devices used to access OCAD U data. If you are a student, this is what we recommend you do with any devices you use in general:
If you have any questions about following these guidelines for your personal device(s) please contact email@example.com