Personal Equipment Policies

The university strives to strike the right balance between the security and accessibility of data. The purpose of the personal equipment policies are to:

  • Ensure that university data is adequately protected
  • Minimize the personal liability of staff in the event of a data loss
  • Clarify support responsibilities for personally-owned equipment
Use of Personal Computing Equipment

Personally-owned computers or peripherals may not be used with the purpose of accessing, supplementing or replacing university-owned computing systems. University-owned or licensed software cannot be installed on personally-owned computers.

Staff may utilize personal portable computing devices such as smart phones, tablets and laptops to access network-based resources through the wireless network. Use of this equipment to access university data subjects it to the data security guidelines listed here.

Data Security

In accordance with university data security policies and for personal liability purposes, staff should not make copies of university data to be edited or accessed on non-university equipment, including home computers. Staff wishing to work from home should use a supported remote access options so that data remains on university systems at all times.

The use of portable USB storage devices is not recommended for storage or transmission of documents. Staff can access the divisional file server remotely through the web or mobile applications to access their shared or personal files.

Although Google Drive can be used to provide remote access to documents, it is not a replacement for the divisional file server. Documents with sensitive information can never be stored on Google Drive.

University data should be deleted from personal computing devices as soon as it is done being used.

Data Loss Disclosure

Any loss or theft of a personal computing device or peripheral containing university data must be immediately reported to the IT Operations Group. This includes, but is not limited to:

  • Home computers which may have contained university documents and email
  • Phones or tablets which may have contained university documents and email
  • CDs or portable storage devices which may have contained university documents

Depending on the nature of the data, the loss may also be reported to the ITS Security group.

Support of Personal Computing Equipment

Due to limited resources, the IT Operations Group is unable to provide general hardware and software support for personally-owned computing equipment, regardless of the physical location of that equipment.

The IT group will provide documentation and best-effort support for connecting to divisionally-supported resources from personal equipment. Issues with VPN connectivity and other university resources are handled by the ITS Help Desk.

Last Updated: May 7, 2013