BYOD in Education: Policy, Risk Management, & Contingency Planning

Contributed by Randall Miller

There are very few people who do not own multiple mobile devices such as laptops, tablets, and smartphones. This is especially the case with the current younger generation. Educational institutions face ever-growing challenges with the security implications of allowing students and faculty to connect these mobile devices to the network. The concept of BYOD (Bring Your Own Device) is reshaping the way IT is managing, delivering, and securing the technological infrastructure in the educational environment. While it is becoming necessary to incorporate BYOD in order to remain competitive, there are some areas that IT managers must be aware of prior to implementation. In order to abide within regulations, protect student data, and maintain the integrity of the datacenter, IT must conduct extensive planning, implement solid policies, and develop contingencies. This paper will address the security implications of BYOD in education and provide insight on the challenges that will need to be overcome in order to successfully and securely deploy BYOD services.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet