Systems up or down

 

Staff Personally Owned Device

If a staff member logs into the UniSA wireless network on a non-UniSA blue plated device, they will receive an email advising them of this. The reason for this is because staff accounts can access sensitive and confidential information which must be kept secure. The purpose of this email is for staff to be made aware of University IT Policies and acknowledge their acceptance of them.

If there is a lapse in following the instructions on the email UniSA wireless access will be limited until the staff member acknowledges the policies through the BPI Task (where the original email directs them).

Sometimes staff receive this email even if they are on a UniSA blue plated device (this email will not be sent for a desktop machine, only laptops or tablets). In these instances, it is because the device has not been recorded correctly and staff will need to still follow the instructions in the email and select the option in the form stating you believe this to be a UniSA owned device.

If you log onto the UniSA wireless or eduraom on a personal device you will receive an email from Appian with subject: Action: [BPI] Acknowledge Personally Owned Device. This is not a phishing email and you will need to follow the instructions in the email.

See example email.

After staff have acknowledged the Personally Owned Devices (POD) Policies they will receive an email confirming this, similar to the example below. If staff do not receive this email in a timely manner they need to check there are no outstanding BPI Tasks relating to their POD and if there is not they will need to contact the IT Help Desk.

See example email.

If there is a lapse between staff receiving the initial acknowledgement email for Personally Owned Devices (POD) Policies and acceptance they will receive an email reminder. This email advises what will happen if this is not completed in a timely manner. Staff need to follow the instruction on the email to ensure no loss of access.

See example email.

If staff do not follow the instructions on the initial or reminder email in a timely manner their UniSA wireless access will be limited until they acknowledge these policies through the BPI Task (where the original email directs staff).

See example email.

This device has been temporarily restricted from accessing resources on the UniSA wireless network, except for the main University web pages.

All devices connecting to the UniSA's wireless network, including personally owned devices, must be configured to comply with the  University‚Äôs Acceptable Use of Information Technology (IT) facilities Policy (C-22.2) and the Information Security Policy.

Your account has recently logged on to the UniSA wireless network with what appears to be a personally owned device. Continued use of personal devices on the UniSA network requires acknowledgement of, and conformance with UniSA policies.  

To comply with sections 4.9 and 4.13 of the Information Security Policy your personally owned device should;  

  • Use encryption if it holds confidential data (section 4.9);
  • Use device timeouts and password/PINs/biometric settings to minimise the risk of unauthorised access to the device (section 4.13);
  • Use anti-virus software with automatic definition update to ensure that the device is protected from known malicious code (section 4.13);
  • Use an automated patching process to ensure that operating systems and applications are kept up to date (section 4.13)

If you wish to use your device on the UniSA wireless network, please check there are no outstanding BPI Tasks relating to your POD and if there is not you will need to contact the IT Help Desk.