(1) This document outlines minimum requirements for computers, laptops, tablets, phones or any other (2) Authority for this document is established by the Information Technology and Security Policy. (3) This Standard applies to all individuals who access the RMIT network or RMIT data. (4) Device procurement must comply with the Business Expenses Policy. (5) All new mobile services and devices must be arranged through ITS using the approved mobile device process. (6) Information Technology Services (ITS) is responsible for: (7) Cost centre managers are responsible for ensuring that mobile devices and SIMs are returned by employees when they leave RMIT. (8) Damaged devices must be repaired at an authorised service agent. Details for service agents can be obtained through ITS. Costs associated with repair are the responsibility of the owning cost centre. (9) Lost or stolen devices must be reported immediately via the Service & Support centre. (10) Authorised users requiring international roaming services on a University mobile device whilst travelling overseas must complete an international roaming request at least five (5) days prior to departure. (11) RMIT Group entities may issue supplementary information to support procurement processes for corporate (RMIT owned) devices to cater for location specific requirements. (12) In some cases, an ITS managed device will not meet the needs of the University. In such cases a non-RMIT managed device may be sourced and used for University purposes. (13) When using a non-ITS managed device (e.g. mobile or laptop) to access RMIT systems or data, users must:User Device Security Standard
Section 1 - Purpose
devices used to:
Top of PageSection 2 - Authority
Section 3 - Scope
Section 4 - Standard
Corporate (RMIT-Owned) Devices
Using a Non-RMIT Managed Device
View Document
This is the current version of this document. You can provide feedback on this policy to the document author - refer to the Status and Details on the document's navigation bar.