BYOD is "Bring Your Own Device" - where you use a computer or device you personally own to do University work.
"Self Managed" is where you use a device that is owned by the University but you are personally responsible for its configuration and administration. Even if you have been given a device which has been preconfigured by your local support, if there is no mechanism constantly keeping it configured then by definition it is self managed.
In most circumstances you will be most secure if you are using a University device running an automatically configured and supported operating system as you will only have the responsibilities of a user rather than also having the responsibilities of a system administrator.
Information on the University supported desktops
Your School or unit may also have their own supported desktops - please check with your local support to see if you are using one or can use one.
You may also find our page of information for new arrivals useful.
If you are using a personal device to access University services then you have a responsibility to ensure that University users, data and services are kept safe.
You should always ensure that any BYOD computers are configured correctly before using, and are kept up-to-date and secure.
How to configure devices securely
You should always ensure that any BYOD mobile phones and tablets are configured correctly before using, and are kept up to date and secure.
You should always ensure that you follow all other relevant guidance such that you confirm with the Information Security Policy, Data Protection Policy and Computing Acceptable Use Policy
If you are using a University owned but self managed device to access University services then you have a responsibility to ensure that University users, data and services are kept safe.
You should ensure that any self managed computers are configured correctly and are kept up-to-date and secure. If you did not perform the original configuration you should check that the configuration is secure and continue to check throughout your use of the device.
How to configure devices securely
You should ensure that any self-managed mobile phones and tablets are configured correctly, and are kept up to date and secure. If you did not perform the original configuration you should check that the configuration is secure and continue to check throughout your use of the device. For iPads there is a University supported configuration service
You should always ensure that you follow all other relevant guidance such that you confirm with the Information Security Policy, Data Protection Policy and Computing Acceptable Use Policy.