Source: https://www.newcastle.edu.au/__data/assets/pdf_file/0004/348286/Information-Security-BYOD-Procedure.pdf