Building a BYOD Strategy For Education

Similar documents
We are XMA in Education.

Getting Started with BYOD

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

HCISD A Digital District High Access BYOD (Bring Your Own Device) District Guidelines

Honeoye Smart Schools Investment Plan (SSIP) Overview Final Plan

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

ios Education Deployment Overview

Rutherford County Schools Bring Your Own Device

BYOD Networks for Kommuner

Meru Education-grade Solutions for Uninterrupted Learning SOLUTION BRIEF HIGHER EDUCATION

Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. Get Started Now: to learn more.

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Clare Middle School. Which should I bring? PLAN

What Is Cisco Mobile Workspace Solution?

BYOD Adaption in Banking

Budget Sub allocations by category that you are submitting for approval at this time.

Secure Your Mobile Device Access with Cisco BYOD Solutions

BYOD Strategy and Solutions

Building Remote Access VPNs

Authorization for Electronic Network Access AUP and BYOD Policies DEFINITIONS. BYOD Bring Your Own Device. AUP Authorized Use Policy

Mobile Device Management

How To Protect Your Mobile Devices From Security Threats

Lincoln Public Schools Technology Plan. Vision for Technology Integration

ios Enterprise Deployment Overview

SMART Software for Mobile Devices Sales brief

HP ProCurve Networking certification for resellers. Place yourself above the competition

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence

WLAN solutions to manage 1:1 and BYOD in K-12

Eastern Illinois University information technology services. strategic plan. January,

KEEPING YOUR SANITY AS YOU EMBRACE CLOUD AND MOBILE

Empowering Students with Mobility and BYOD Technology

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

IT Self Service and BYOD Markku A Suistola

How To Make Your School Successful Online

NANUET UFSD Instructional Technology Plan - Annually

Secure File Sync & Share with Acronis Access Advanced Date: July 2015 Author: Kerry Dolan, Lab Analyst

CHAPTER 6 NETWORK DESIGN

Bring Your Own Device (BYOD) Launches September 2015 Students in Grades The How of BYOD

NEXTix UNIFIED CITY-WIDE TELECOMMUNICATIONS

Dell Connected Learning for Schools. Transforming Education for the Digital Age

Cortado Corporate Server

How Nokia deployed AirWatch MDM for Nokia Lumia

Strategic Plan FY

BYOD (Bring Your Own Device)

1.1.1 Introduction to Cloud Computing

BYOD Strategy - Advantages and Disadvantages

Building a Comprehensive Mobile Security Strategy

TECHNOLOGY AND OUR STUDENTS. A Rationale and Proposal for Expansion

The Network and The Cloud: Addressing Security And Performance. How Your Enterprise is Impacted Today and Tomorrow

Deploying Apple ios in Education

For Android A LEADING PROVIDER OF CONSULTANCY & TRAINING IN MOBILE TECHNOLOGIES IN EDUCATION

Mobilize to Rightsize Your Network

CellCast Solution for BlackBerry Smartphones. Security Overview. Revised: June

Triad Local School District Bring Your Own Device Student Device User Agreement F1

ty School District Digita al Classrooms Plan

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Intelligent, Functional and Effective Gateways for Small Business Applications

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

LuminonCore Virtual Desktop Infrastructure (VDI) Products

Speeding Office 365 Implementation Using Identity-as-a-Service

An Intelligent Solution for the Mobile Enterprise

The 9 Pillars of Enterprise Mobility

A CIO s Guide To Mobility Management

Acceptable Use Policy Holy Spirit Catholic School

AC : LESSONS LEARNED FROM MOBILE COMPUTING AP- PLICATION DEVELOPMENT WITH ANDROID. Dr. Se Jun Song, Texas A&M University, College Station

Technology Department Infrastructure & Support

Network Design Best Practices for Deploying WLAN Switches

Meraki 2015 Solution Brochure

AirWatch Solution Overview

Transcription:

A CBTS White Paper Building a BYOD Strategy For Education Chris Burns Marketing Director, CBTS 8/1/2012 www.cbts.cinbell.com

Overview the BYOD Trend in Education Bring Your Own Device (BYOD) is one of the hottest IT topics in education and business in 2012. CBTS learned after a great deal of research and surveys, that there are few experts in this field because the concept is still in its early stages. The educators who have been involved are adamant in their opinions either for or against it. Arguments both for and against have merits. In reality, administrators, faculty and students are already using multiple devices today, including mobile devices, for all types of communications and learning both inside and outside the classroom. The users are comfortable with the devices they own and have learned how to use them effectively for their purposes. Mobile devices in particular are used many times each day for research, communication, and other knowledge-based functions by students and faculty alike. In light of these facts, we believe that the first point to consider in the process of implementing a BYOD strategy is establishing the underlying goal for introducing and supporting a BYOD policy. Defining and communicating that goal is paramount to ensuring that all parties affected, understand why BYOD is being implemented, as well as the expectations of the parameters around that implementation. William Stites, Director of Technology for Montclair Kimberley Academy in New Jersey, makes a salient point about what should drive BYOD. First and foremost, any program should meet your learning goals and your mission, and match your school s culture. Our focus would be on the learning process and how we would support that through training, professional development and teaching. In other words it is not about the device, but what is being taught and learned using the device. The goal is to understand that each device is simply one of many different options for communicating and some will offer more robust learning opportunities than others. The key is to try to maximize the overall message first, and then understand the multitude of ways for students to receive that message. This is the approach that successful schools have adopted to implement BYOD. As opposed to focusing on how to monitor and control each device on the school s network, they focus on the educational message and the delivery of that message, and ensure that the focus is in unison with the district s vision and goals. The Speak up 2012 National Survey clearly shows that more students are ready for active online learning and web access for multiple devices than most districts. Most students understand their devices and mobile technology extremely well. When the time comes to add students to a BYOD program, they should be involved at the inception of the decision making process to give their buy-in and ideas. Surveys show this will have a considerable impact on the success of the program and allow the planners to understand the possibilities, as well as the limitations from the students viewpoint. Each school is different and each BYOD program that has been successful mirrors the school s culture as much as possible. The schools that focus on finding the best method for delivering their curriculum, followed by making sure the faculty understand the goals and challenges, and then offering professional development, are the ones that champion the BYOD program. Page 2

The Critical Components Page 3 1. Network A district s network needs to be a certain standard that is consistent in every building that participates in the BYOD program. That network must be able to handle the existing traffic, have redundancy and scalability for future growth, and allow access of approved personal devices. In addition, there must be enough access points throughout the participating schools. 2. Security This is critical because of the need to protect critical information, yet allow access to network, applications, and services. Options include creating or expanding a separate guest network for BYOD, where personal information cannot be accessed or utilizing a virtual desktop solution. In general, all devices will not be able to access or display the same material in the same way because the goals of faculty and staff are different from the students. There will always be a question of how much access is allowed vs. how much security. Those are decisions that should be addressed prior to any implementation. 3. Defining and Setting a Policy The district will have to develop a clear and identifiable policy for user-owned devices that protects the district and students. It should clearly state any changes of existing practices, as well as the policies for both faculty and students. 4. Ensuring Proper Training To ensure success, it is critical for all stake holders to understand the program, the policies, and the devices to be used. This is best accomplished through proper training on how to maximize the learning opportunities through those devices. It is important for the IT staff to understand and handle the increase in questions about the network and access for the BYOD devices. 5. Some Cost Shifting from the School District to Users There is still a cost involved, but with BYOD, the cost may shift from the school district to the users or in some cases, the parents. Also, depending on the location of the district, there could be a wide gap of adoption between those with high-end devices and those who have none. This should be considered when determining how the curriculum and assignments can be received. 6. Creating a Culture of Acceptance and Change District personnel at all levels must embrace the changes brought on by new technologies. Students in many cases are already more tech-savvy than their teachers and parents. Understanding the changes and how to take advantage of the BYOD program effectively will help close the generation gap and improve learning opportunities. Paradigm shift is never easy or simple. Proper time to study, evaluate and understand the benefits and risks is critical to the ultimate success of BYOD in schools.

The BYOD Benefits 1. Access to Network and District Information Anywhere, Anytime With mobile communication devices, some faculty and many students are already at the forefront of the technology curve. Giving them the ability to utilize their devices for teaching, research, learning, sharing, and communicating, will better prepare students for the world of college and work. 2. District Costs Could be Reduced Utilizing faculty and student owned devices could help reduce the IT equipment, maintenance, and refresh cost for school districts. From a mobile standpoint, BYOD would mean that the district would focus more on software, security, applications, and delivery, as opposed to maintaining and continuously refreshing different types of devices. 3. Guest Network Could be Fully Utilized Schools with an existing guest network in place could utilize and expand that network to include at least some of the applications and programs that teachers and eventually students would be able to utilize for BYOD. The guest network should remain separate from the main network. This will protect the critical information and reduce potential security issues, while improving access and accelerating adoption. 4. A New Way of Teaching and Learning Teachers that understand how to utilize the web for learning give themselves another tool to reach those students that may not do as well in a classroom or structured environment. Teachers can offer lessons and projects that utilize the Internet for research, sharing, storing documents and innovative ideas. This empowers the teachers and students who take the initiative and creativity to new levels. Students can also benefit from using tools they understand and use every day to schedule activities and communicate. 5. A New Way to Collaborate BYOD breaks the boundary of learning, giving teachers and students unlimited resources on the Internet and the ability to communicate in many different ways. It also creates opportunities for teachers and students to collaborate at a time and place they are most comfortable with. Page 4

Recommendations The requirements for implementing a successful BYOD program are varied, but each one is critical. Districts must ensure that the infrastructure is in place to handle the increase in traffic and that security is tight enough to protect confidential information. A policy must be developed that enhances learning, but in an environment where the district can maintain control over the program. Our recommendation is to phase the program in so that best practices can be repeated and documented, and challenges would be reduced or eliminated prior to a district-wide rollout. Training and allowing faculty and staff to experience the BYOD project first, would help them understand the value, opportunities and limitations. Before moving toward a more extensive implementation that would include students, the district should closely study and evaluate the impact, both positive and negative, and assess the feasibility, usefulness, benefits and challenges of implementing the BYOD program. We are recommending that the following steps be taken to ensure the best chance of success. 1. Network Three components related to the network are critical for a successful implementation - bandwidth, redundancy and scalability. A successful program will allow bandwidth to increase incrementally as the program ramps up from school to school. For schools involved in a BYOD program, the greatest demand for that bandwidth during school hours will likely come from video. Also, once the program expands to multiple schools, the likelihood of the network being adversely affected increases. Quality and consistency of the network is important, as well as ensuring that critical communication is available and maintained at all times. Evaluating the network to ensure it has the capacity to grow is critical. Districts must invest in upgrading the network if needed to make sure it can handle the future demand for capacity. 2. Network Management Successfully managing and maintaining a growing network comes from planning and ensuring everything meets or exceeds the expected demand. This could mean an upgrade or new tools and training for the IT staff. In the planning stages, allow the staff to try different devices and tools so that issues can be identified and solved prior to rolling it district-wide. There are a growing number of tools on the market that assist with network management. Some now provide 100% management of switches, routers, and other devices, as well as wireless management and the ability to power up and down based on expected utilization. This could also reduce costs since utilization would be reduced during weekends and long breaks. 3. Security The key question is one of balance between protecting the confidential information and privacy of the users, and ensuring network access for user-owned devices. Federal regulations Page 5

governing content filtering and firewalls are clear and have to be implemented by K-12 administrators in public schools. A primary focus of a district s Internet services could involve personal information security. Security components, such as firewalls and ID codes, ensure that improper content and context are not transmitted and that the information security and access policies of the district are enforced. All users would need to authenticate when they access the Internet. It will take time to set up and even more time to administer access from every student that signs up. The network can support a pilot easily, but if the BYOD program is rolled out for the entire district, there must be assurance that the number of devices that need Internet access is anticipated prior to implementation or that there will be some limitations to the devices allowed on the network. Once users are registered, new software can manage and monitor access and usage. Districts should consider a strong security model / policy to offer an elevated level of protection. A policy server is an excellent option because it not only authenticates, but also authorizes user access at the access layer for wired and wireless. 4. School-Owned Devices Almost every school provides some type of compute device for students to use on the campus and some allow students to take the device home. If BYOD is implemented, consideration will be needed to ensure that all students will have some type of access to the information, regardless of device ownership or where the device is located. Broadband access or some type of Wi-Fi should be available at home or a public safe area such as a library. Teachers or students could utilize Wi-Fi and VPN into the school network to access school resources, with the proper credentials and authorization. This should be possible with the firewalls and client / clientless VPN capabilities offered by that device. 5. Student-Owned Devices A decision must be made on what type of delivery system to pursue that allows broadcasting of the curriculum for mobile use. The delivery will very likely change, depending on the device and not all devices will be able to access the content in the same way. Prior to allowing students access to the network, districts should send out a survey to understand how many students have their own devices and the type of devices they use. The type and level of learning is another salient factor that will impact the decision of which devices should be allowed to access the school network. A successful BYOD plan doesn't necessarily have to support any or all devices. Very few businesses and institutions have the network, bandwidth and IT staff that can support all devices; so a decision will have to be reached on which ones to allow and support. Gartner states as it relates to BYOD In the short term to midterm, there will be more platforms to support; and probably in the longer term, a shift from supporting devices to supporting applications and data as technologies, such as HTML5, allows more device independence." NOTE - There is no limiting G3 or G4, other than through policy. Many of these devices will have Wi-Fi regardless and students will choose that over 3G/4G. Therefore, it should be encouraged Page 6

to utilize these devices by limiting them with wireless policy access, role-based access and Internet filtering. Policies should address this issue. 6. User Policies Review your network access, acceptable use and conduct policies as they apply to students and employees to determine if an update is needed to reflect the new issues involved in BYOD and mobile learning. It is important to clearly define upfront, the type and amount of support the end users can get from the IT staff, as well as the type of applications and services the district will be offering. This will set the parameters for the entire program right from the start. Most districts offer limited support for mobile devices, thus leaving it up to students and the manufacturers to solve connection and bandwidth use issues with mobile devices. Districts should deploy role-based access on wireless and wired networks, then deploy sponsored guest access, and continue to filter Internet traffic. 7. Knowledgeable IT Staff The IT staff must be prepared for the changes, questions and resulting challenges and risks surrounding BYOD. The schools that were researched offered different methods, tools and ideas for communicating their lessons to the students. It s important to allow teachers to utilize their strengths and the technology to reach as many students as possible through various learning styles and devices. This will be limited by the equipment and technology the IT staff can support. 8. Mobile Device Management (MDM) CBTS would recommend MDM at some point in the move toward BYOD. MDM will help the district manage the devices on the network. Without some type of management tool, this is extremely labor intensive. An MDM tool will allow the IT staff to properly support and track the devices on the network, if that is the goal. Gartner states that many organizations are electing to implement a mobile device management product to facilitate enrolling devices into the plan, to ensure that policy settings are pushed onto the device, to provide compliance reporting, to monitor usage/policy compliance, and to put configuration parameters onto the device for access to networks and email. 9. Mobile Application Management (MAM) Another management tool that would assist districts is a solution that focuses more on controlling and managing the apps made available on the network, known in the industry as Mobile Application Management (MAM). MAM describes software and services that accelerate and simplify the creation of internally-developed or in-house mobile applications. It also describes the deployment and management of in-house and commercially available mobile apps used on both organization-provided and bring your own smart phones and tablet computers. When an employee/student brings a personal device into a business or school setting, MAM enables the IT staff to provision the device, download appropriate applications, control access to back-end data, and wipe the device if it is lost, or when its owner no longer works with the organization. Page 7