Technology Services BYOD Guidelines

1.         Acceptable Use Guideline

1.1       Purpose

The purpose of this document is to provide a set of standards and rules for the use of personally owned devices brought into MIT by students for the purposes of learning.

It also applies to staff who may prefer bringing their own device into MIT for work or study purposes.

Furthermore, this guideline is intended to protect the security and integrity of MIT’s data and technology infrastructure.

The term ‘device’ refers to laptops, tablets and other devices brought onto campus which are owned by the student or staff member and have the capability of connecting to MIT’s wifi network.

2.         Guideline

MIT will implement the following controls for BYOD devices:

MIT supports and encourages bring your own device (BYOD) on the wireless network. However, the use of personal mobile phones, tablets, portable computers, laptops etc must comply with these guidelines and the assertions outlined in MIT’s Technology Services policies namely:

  • Acceptable Use Policy (ICT1).
  • eMail Policy (ICT3).
  • Internet Policy (ICT4).

2.1       Damage and Loss

Students are encouraged to bring their own devices into MIT. However, it must be understood that it is at their own risk.

MIT is not liable for the physical protection, replacement or repair of personal devices.

Students and staff in possession of portable devices must not leave their devices unattended.

2.2       Purchasing Supported Devices

Staff and students need to purchase their own devices.

It is the responsibility of the student to ensure they have a supported operating system and current antivirus software installed on their device. All software running on the device must be legally and appropriately licensed.

MIT has appointed the following agents to assist in the sale and support of personal devices:

  • PB Technologies (Manukau).
  • Noel Leeming (Multiple locations).

Preferential prices may be given to students/staff for repairs and purchases at these retail outlets, provided a valid student ID card is produced.

Students/staff should consider the size and weight of the device before making a purchase. Smaller devices can be more portable, but they may not have the processing power required for their programme of study. When choosing a device, students should consider the minimum technical specifications required for their programme of study (see Annexure A and B), and the locations where the device will be used.

Students should also be aware of warranty period of the device. They should also check to see if the manufacturer offers an international warranty rather than one limited to the country in which the device was purchased.

2.3       Minimum System Requirements

In order to access MIT’s network for study purposes, devices must meet certain requirements.

Refer to Annexure A for the list of supported devices recommended by MIT.

It is important to note that students and staff are solely responsible for the care and maintenance of their own personal devices.

MIT is not responsible for providing training or technical support on your device if it is below minimum specification. This includes any of the following potential issues:

  • Slow performance.
  • Physical damage.
  • Virus infections.
  • Upgrades to hardware or software.
  • Operating system failure.
  • Application support/training.

Random access memory (RAM) and processing speed must conform to the minimum requirements of the programme of study.

2.4       Portable Device Security Requirements

MIT does not sell antivirus software for personal computers and BYOD devices. However, packages can be purchased from the above mentioned designated agents.

A list of recommended antivirus software is available at:

MIT’s security standards will be enforced as per our Acceptable Use Policy (ICT1) on all devices connecting to or synchronizing with MIT’s computer systems and networks, and is not able to be changed irrespective of who owns the device.

Personally owned communication devices may not be connected to or synchronized with MIT’s computer systems or networks, unless the device owner agrees to the security requirements regarding the management of the device.

BYOD security requirements may include:

  • Agreement for MIT security software/certificate to be applied to the device in order to gain wifi access.

MIT recommends the following security settings be set by users:

  • PIN or password protection.
  • Anti-virus software installed.
  • Personal firewall installed where available.
  • Encryption turned on.
  • Disabling non-essential communications functionality.
  • Auto update of the operating system.

2.5       Remote Access

Remote users will only be permitted access to applications and systems that they have been given approved access to, for the purpose of fulfilling their obligations to MIT. Remote connections must initially be configured by Technology Services staff to securely authenticate users in accordance with internal security requirements. Only enrolled students or approved guests will be permitted to connect to MIT’s internal computing resources.

The following URL is the preferred remote access portal for all students and staff at MIT.

Almost all of the prescribed software required for study programmes will be available via this portal, as well as access to the H:Drive (personal storage space on the MIT network).

All other remote access will be unauthorised.

2.6       Hosted Software via Citrix

In order to accommodate a BYOD environment, Technology Services has provided a technology platform called Citrix that allows all end users (students and staff), the ability to receive the desired applications for their programme of study on any type of device.

The hosted desktop will provide a default set of applications packaged into a desktop. This desktop will accommodate 80% of student and staff needs across all MIT’s campus’ and deliver a consistent user experience across all faculties and devices.

This means that most students will not need to purchase any additional applications for the duration of their study at MIT.

Some software used in specialist laboratories  i.e. networking and multimedia labs, is not available via the Citrix remote access portal. These applications are only available on specialist laboratory computers.

Citrix sessions left inactive for a period of 15 minutes should be protected by a password protected screen saver and the connection will time out after 30 minutes of inactivity.

2.7       Office 365

MIT students and staff have access to Microsoft’s Office 365 Pro Plus package at no cost.

This package allows students to download Word, PowerPoint, Excel and Outlook on up to five separate devices.

Along with the latest software, some free cloud storage is also provided.

 2.8       Google Apps for Education

MIT students and staff have access to the Google Apps for Education suite at no cost.    kjkjkjjkj

2.9       Summary of Applications Provided to Students and Staff








2.10    Eduroam

Eduroam allows students, researchers and staff from participating institutions to obtain internet connectivity across campus and when visiting other participating institutions by simply opening their laptop, or turning on their phone.

Eduroam separates the concepts of authentication (identity providers) and hotspots (service providers) allowing public, commercial or city wifi initiatives, in addition to research and education institutions.

Eduroam is free for its users. The providers of eduroam hotspots make the service available to benefit all members of the research and education community.

For more information on Eduroam, view the following link:

2.11    MIT’s Right to Monitor and Access All Computer Systems

In order to protect MIT property, people and technology and ensure compliance with legal and statutory obligations, monitoring the use of MIT computer systems will be undertaken. This will apply whether MIT systems are accessed at a MIT site, at home or any other location.

Monitoring may include any of the following:

  1. The content and usage of MIT email (as per MIT’s eMail Policy).
  2. Internet usage and participation in discussion forums to: (as per MIT’s Internet Policy).
  • Identify inappropriate use.
  • Protect system security.
  • Maintain system performance.
  • Protect the rights and property of MIT.
  • Determine compliance with MIT guideline.

iii. Network traffic including:

  • Email and internet usage.
  • Usage data such as account names, source and destination accounts and sites.
  • Dates and times of transmission or access.
  • Size of transmitted material.
  • Other usage related data.
  1. Remote access.

Information obtained whilst monitoring is occurring, may be used for the purposes of accounting, troubleshooting and systems management, and where appropriate, disciplinary action.

2.12    Battery Life of Device

Students/staff are responsible for managing the battery life of their device. They must ensure that their devices are fully charged before bringing it to MIT. Power points for charging devices are available in some common areas and classrooms.




Please note: These are the minimum requirements for new devices that will be supported by MIT (i.e. any devices purchased from January 2017 onwards).

MIT will not be responsible for any liability or access issues that may arise on devices with lesser specifications than those listed below (unless purchased before January 2017).


Important note: Please refer to Annexure B for those programmes requiring a higher CPU.



 Faculty of Consumer Services



Faculty of Business and Information Technology

Important note:

  • Devices required for business studies should be i3 or above.
  • Devices required for IT programmes should be i5 or above.



Faculty of Maritime and Logistics


Download PDF document here