To help keep our University systems and information secure and to protect ourselves against the risk of cyber attack, we are making some changes to how Bring Your Own Devices (BYOD) are used at the University.
Bring Your Own Devices are any personal devices such as desktops, laptops, tablets and mobile phones used to access certain University systems and data as part of your day-to-day work, but which are not owned or maintained by the University.
We need to be assured that any personal devices which are used to access University systems are secure and cannot be exploited by hackers.
As well as helping to keep our information secure, knowing where our University systems are being accessed from and where our data is stored, is also required in order to achieve standards required by a number of our funding partners. This includes Cyber Essentials, a government-backed scheme held by many other leading universities.
You can read more about the Cyber Essentials requirements in the frequently asked questions at the bottom of this page.
Information has been shared with Department Heads to inform team members.
To help achieve these required standards, and ensure data security, we need to gather a list of all devices accessing our University systems.
We are therefore asking all staff (including graduate teaching assistants) to share some details of any personal laptops, desktops, tablets or mobiles which they use to access University systems.
Contractors, visiting lecturers, examiners or other external partners will not be asked to register their device at this stage.
You will need to register your personal device if you use it to:
If you only use a personal device to take standard work calls (not Zoom), text messages (SMS) and for Duo and Google multi-factor authentication, registration is not required.
Staff will still be able to use their personal device to access these systems but to help keep all of the University information stored on them secure, we need to have a record of all devices accessing them.
We are only asking you to record the minimum information required by the Cyber Essentials standard. The information we share as part of our Cyber Essentials will be anonymised however we may contact you if there is a specific issue with the device you’re using, or if the operating system you’re using goes out of support.
We understand that it can be useful for staff to use a secondary, personal device for work e.g using your mobile phone to check emails or Slack messages whilst on the go. You may also be using a personal device to work from home if you have a managed desktop PC in your office on campus.
At the end of the device form you will be asked to confirm you agree with a set of obligations. These are there to ensure that you know that by using personal devices for work, the University has requirements on you to keep your devices up to date with security.
The policy for device access to University information has been updated to cover the use of Bring Your Own Devices.
This policy prohibits the downloading of any Confidential Data on any personal devices.
This means that while you may work on a Confidential Data in a Google document or sheet, you must not use the ‘Download’ function to save a copy on your personal devices.
We also need everyone to be aware when they are accessing or downloading attachments from emails or Slack as they may also include confidential information.
This is to protect the private information of our staff and students, we cannot have any Confidential Data saved on devices which are out of our control.
It is important that all staff take the time to read this updated policy.
Cyber attacks against higher education organisations are increasing significantly and we have seen large organisations taken offline or having to restrict their access to IT systems as a result of these attacks.
Whilst we are currently working to make sure all employees have access to a managed device, which will reduce the likelihood of such an attack, we also need to look at the personal devices which are used to access our University systems and which may introduce vulnerabilities that could be exploited by hackers.
Additionally, the University previously held a certification called Cyber Essentials. This demonstrated that the essential security and information assurance controls were in place, and is a standard that is commonly asked for by external research parties. When the standard was updated last year it introduced requirements for BYOD that we cannot meet without compiling a register of all the BYOD devices in use.
All employees must use a managed device as their primary device. If you do not have a managed device, please contact your department admin team to arrange to receive one (via IT's end-to-end service).
You may also use a secondary personal device if you need to as long as you don’t download any confidential information on it. You may work on confidential information in a Google document or sheet but you must not use the ‘Download’ function to save a copy on your personal device.
Postgraduate research students must register their personal devices on the BYOD asset register if they use them in any of the ways listed above. This requirement is due to their access to systems that store University information, which is not available to other postgraduate or undergraduate students.
If there is a breach or compromise of your BYOD we will need to work with you to understand what has happened and what University information or systems may be at risk. We would use any incident as a learning opportunity on how to prevent such instances in the future, rather than apportion blame.
However, we are taking this opportunity to remind everyone of their obligations to be compliant with our policy for device access to University information; making sure you are updating your software with the latest security fixes and not using BYOD to access confidential information
Confidential data is classified as ‘information that can be seen by University members on a need-to-know basis as determined by the responsible Data Owner.’
We are only asking you to record the minimum information required by the Cyber Essentials standard and to ensure your device has a basic level of security.
For laptops and desktops:
For mobile phones and tablets:
At the end of the device form you will be asked to confirm you agree with a set of obligations. These are there to ensure that you know that by using BYOD the University has requirements on you to keep your devices up to date with security.
Yes, you must register all personal devices you use to access the University systems detailed above.
No, if you have more than one personal device, you will need to register them in separate submissions because we need to know specific device details.
The University is committed to all staff maintaining a good work-life balance. If you are not required to be contacted outside of usual working hours as part of your role, consider removing work apps such as Slack or Zoom or logging out of your work email account on your personal phone. We understand this may not apply to those members of staff who need to be contacted when working around campus during work hours.
No, registering your device does not mean IT Service or anyone else at the University will be able to view, access or control it. We just need to know which devices are accessing our systems.
We are currently not planning on putting any technical limits on devices accessing our systems which are not registered on the device register. One of the key things we are trying to protect is confidential data, if you download confidential data on personal devices you will be in breach of the policy for device access to University information.
There is currently no scope to provide additional work phones. Staff will still be able to access the systems they require for work on their personal devices. If you do register your personal device, nobody at the University will be able to access or view any content on it.
Personal devices present several security challenges to the University and when we’re asked to demonstrate that our information is kept safe and in line with external security standards required by external agencies such as our research partners.
Challenges include:
It is difficult for the University to ensure that sensitive data is kept secure, and therefore we must take steps to look at and address these risks, such as implementing policy on what type of information can and cannot be accessed on a personal device, ensuring personal devices are encrypted and offering a range of security training to staff.
Cyber Essentials is set by the National Cyber Security Centre (NCSC) as a baseline minimum standard for information and cyber security. Certification to this standard is now common in public sector backed procurement and research contracts and was something the University previously held.
When the standard was updated last year it brought in requirements for personal devices that we cannot meet without the updated policy on device access and compiling a register of all the personal devices used.
The new standard has two criteria that brings personal devices into scope:
The Cyber Essentials standard is updated annually and at present our policy and guidance approach is compliant with the standard, however we will need to adapt if the standard develops further. We will update everyone if further changes are required.