Skip to main content

JSU CYBER AWARENESS

BRING YOUR OWN DEVICE POLICY

 

Abstract: 
JSU’s BYOD policy is designed to ensure that the employees use strong security practices when connecting to the University network and outlines what it views as acceptable use of the technology, and how to operate it.

Effective Date: 2/2/2016
Review/Revised Date: 4/20/2023 
Category: Information Technology
Policy Owner: CIO/Information Technology
Policy Contact: CISO/Information Technology

 

Policy Statement

Jackson State University (JSU) grants its employees the privilege of purchasing smartphones and tablets of their choosing for work-related use. JSU reserves the right to revoke this privilege if users do not abide by the policies and procedures outlined below.

Purpose

This policy is intended to protect the security and integrity of JSU’s data and technology infrastructure. Limited exceptions to the policy may occur due to variations in devices and platforms.

 

Definitions

  • Acceptable Use- is defined as use for activities that directly or indirectly support the business of JSU.
  • Personal Use -is defined as a reasonable and limited amount of University time spent on personal communication for recreation, such as reading or playing a game.

 

Employee Adherence

JSU employees must agree to the terms and conditions set forth in this policy in order to be able to connect their devices to the JSU network.

 

Policy

Acceptable Use

  • Employees are blocked from accessing certain websites during work hours while connected to the University network.
  • Employees may use their mobile device to access the following University-owned resources: email, calendars, contacts, documents, etc.
  • Devices’ camera and/or video capabilities are not disabled while on-site.
  • Limited amount of personal apps and game apps usage are permitted during work hours.
  • Devices may not be used at any time to:
    • Store or transmit illicit materials
    • Store or transmit proprietary information belonging to another university
    • Harass others
    • Engage in outside business activities

 

Policy Compliance

  • An employee found in violation of this policy may be subject to disciplinary action and network access be revoked for a limited amount of time until security training is verified by JSU’s Division of Information Technology (DIT) department.
  • An employee found in repeat violation of this policy may be permanently revoked from JSU network access.

Related Standards, Policies, and Processes

  • Mobile Device Security Policy
  • Acceptable Use Email Policy
  • Data Classification Standards
  • Data Security Policy
  • Data Security Definitions
  • Acceptable Use

 

JSU CYBER AWARENESS

Location

1400 John R. Lynch Street
Student Center
Jackson, MS 39217-0280

Phone: 601.979.2241