Bring Your Own Device (BYOD. Always consult the Xxxxxxx State University’s Computer & Network Acceptable Usage Policy (xxxx://xxx.xxxxxxx.edu/oits/Usage-Policy) for up-to-date standards and guidance. In addition, BOR Policy Section 8.0: Standard of the University System of Georgia Information Technology Handbook (xxxx://xxx.xxx.xxx/information_technology_handbook/section8) provides for empowering USG including CSU staff to innovate and work on USG and CSU business more effectively inside and outside the office. Based on research at other enterprises, greater productivity and employee satisfaction should result from establishing a prudent BYOD standard that empowers employees to work on personally-owned devices while protecting the confidentiality, integrity, and availability of USG and CSU data. This standard intends to balance the use of personally-owned devices while preventing USG data from being deliberately or inadvertently stored insecurely on a device or carried over an insecure network where it could potentially be accessed by unauthorized resources. Such a breach could result in loss of information, damage to critical applications, financial loss, and damage to the USG’s public image. Therefore, all users employing a personally-owned device connected to a USG and CSU network, and/or capable of backing up, storing, or otherwise accessing USG data of any type, must adhere to USG and CSU- defined policies, standards, and processes.
Appears in 2 contracts
Samples: Employee Handbook, Employee Handbook
Bring Your Own Device (BYOD. Always consult the Xxxxxxx State University’s Computer & Network Acceptable Usage Policy (xxxx://xxx.xxxxxxx.edu/oits/Usage-Policy) for up-to-date standards and guidance. In addition, BOR Policy Section 8.0: Standard of the University System of Georgia Information Technology Handbook (xxxx://xxx.xxx.xxx/information_technology_handbook/section8) provides for empowering USG including CSU staff to innovate and work on USG and CSU business more effectively inside and outside the office. Based on research at other enterprises, greater productivity and employee satisfaction should result from establishing a prudent BYOD standard that empowers employees to work on personally-personally owned devices while protecting the confidentiality, integrity, and availability of USG and CSU data. This standard intends to balance the use of personally-personally owned devices while preventing USG data from being deliberately or inadvertently stored insecurely on a device or carried over an insecure network where it could potentially be accessed by unauthorized resources. Such a breach could result in loss of information, damage to critical applications, financial loss, and damage to the USG’s public image. Therefore, all users employing a personally-personally owned device connected to a USG and CSU network, and/or capable of backing up, storing, or otherwise accessing USG data of any type, must adhere to USG and CSU- defined policies, standards, and processes.
Appears in 2 contracts
Samples: Employee Handbook, Employee Handbook