Purpose
This policy provides guidance on the use of Apple iPads and similar devices for all Volunteer State Community College locations.
Definitions
For the purposes of this policy, the following definitions shall apply:
- Apple iPads and Similar Devices – tablet computers designed, developed, and marketed as a platform for media consumption, web browsing, and light productivity tasks. General characteristics include: flat, portable device with a touchscreen interface; easily mobile and/or handheld; thinner and lighter than a traditional laptop computer; rely heavily on downloadable applications; and have an operating system that requires routing patching.
- Information Technology Resources – all Volunteer State Community College information technology hardware assets, software assets, computing systems, networks, network components, facilities, services, data, and information, regardless of location, provider, management, medium, or how the resource is provided/delivered, that exists for the purpose of conducting business or academic activities. This includes, but is not limited to, computers, servers, mobile devices, email systems, internet access, cloud-based applications, databases, and any associated peripherals or support services.
- Jailbreaking – the removal of software restrictions imposed by a device manufacturer. This activity bypasses security measures and grants the user root access to the operating system. Jailbreaking could allow a user to install applications and alterations not approved by the applications’ developers, customize device appearance and functionality, and access features not normally available on the device.
Policy
- Requesting iPads and Similar Devices for Faculty/Staff
- Subject devices may be requested by faculty/staff where the use of the device significantly enhances the performance of the academic/business activities of that employee.
- All subject device procurement shall be handled by the IT Department. Under no circumstances will any other Vol State department procure any IT equipment or resources. All requests must include clear justification of the academic/business purpose.
- Vol State will not fund any cellular voice/data plans associated with subject devices. The IT Department will purchase only Wi-Fi enabled devices.
- Requesting iPads and Similar Devices for Classroom Use
- Subject devices may be requested by faculty for classroom use in conjunction with an approved departmental plan of instruction and clear justification of academic purposes. Requesters shall provide justification for all requested accessories, planned use for the device(s), how the impact of the device on student learning will be measured, and what software applications will need to be purchased.
- Funding may be sought from the TAF budget, subject to standard TAF requirements as outlined in Tennessee Board of Regents (TBR) Guideline B-060 and the availability of funds.
- All software acquired by Vol State shall be inventoried by IT and records shall be maintained by IT for all license agreements governing software executed on IT resources and systems supported by Vol State. All software media acquired by Vol State shall be labeled to indicate that the software has been inventoried.
- Subject devices are considered IT assets. As such, they will be tagged and inventoried in the standard manner as for all IT assets. Upon receipt, all purchased devices shall be delivered to the IT Department for processing and distribution.
- Subject Device Support
- Jailbreaking of subject devices is strictly forbidden and NOT supported by Vol State, thus IT technicians shall not provide any support for jailbroken devices. Jailbreaking voids the warranty and/or AppleCare contracts.
- Users shall store all Vol State data within the approved cloud storage solutions and NOT on the subject devices.
- The IT Department will deploy cybersecurity policies and other requirements on subject devices. Examples include tracking software and antivirus software.
- The CIO or their designee has the final authority to interpret the terms of this policy. The CIO or their designee may grant exceptions to this policy, in writing, based on an evaluation of the risks versus the benefits.
TBR Source: none.
VSCC Source: June 28, 2002, President’s Cabinet; March 30, 2007, President’s Cabinet; June 25, 2012, President’s Cabinet; August 13, 2025, President’s Cabinet



