Information Security

Using BYOD or Self-Managed

Guidance when using a "bring-your-own-device" at work, or when you manage the configuration of a computer yourself.

Your responsibilities

If you are using a self-managed computer,  you have a responsibility to configure it securely. 

How to protect

Self-managed computers

Any computer or device you use that has not been configured by the University Supported Desktop, or is not automatically configured by a service in your School counts as "self-managed".

This "automatic configuration" needs to be of the kind that keeps your computer up-to-date on a regular basis. If the computer is configured once, at the time it is allocated to you, it is quite likely to count as self-managed and you need to take responsibility to keep it securely configured.

Supported Desktops

Many laptops and many desktops are not configured using Supported Desktop. You still have a responsibility to protect all the information they carry. With a self-managed computer you have the responsibility to configure it as strongly and safely as practical. Follow the link to "How to protect" above.

School-managed computers

Some Schools have their own methods for managing the configuration of computers for staff, for their labs, and in some cases for students. Check with your School computer support team if you are not sure if a computer you are using counts as self-managed.

BYOD 

A BOYD is any computer or device that you own, that is used for any kind of University business. If you do University work on it, you are responsible for ensuring it is configured securely.

How to protect