SlideShare a Scribd company logo
1 of 45
Surviving a BYOD
Implementation
Diana Benner
Director of Professional Development
972-275-9251
dbenner@tcea.org
@diben
http://www.facebook.com/tcea.org
http://twitter.com/tcea
http://tcea.mymemberfuse.com/
Poll Question
Which is/are true for you regarding a BYOD (Bring Your Own Device)
implementation? Select all that apply.
 My school/district has already completed a BYOD implementation
 My school/district is in the process of a BYOD implementation
 My school/district is considering/planning a BYOD implementation
 I’m not sure if my school/district is considering a BYOD implementation
 I’m very familiar with the BYOD topic.
 I’m somewhat familiar with the BYOD topic.
 I’m new to the BYOD topic.
1. BYOD deepens the
digital divide.
2. Teachers must be in
control in order for a
BYOD to be
successful.
3. BYOD will result in
lessons geared toward
the weakest device.
4. BYOD will necessitate
the standardization of
apps and software
across all devices.
5. A BYOD
implementations takes
lots of planning.
Which of the following is/are myths regarding
BYOD? Share the number and your reasoning.
Project & Lesson
Inventory
Best Practices
Classroom
Management
District Policies
& Procedures
Infrastructure
Professional
Development
Devices Support
TOP
SECRET
Advantages &
Disadvantages
1. Learners are more engaged in connected classrooms
2. Increased opportunities for introverted students to participate in
discussions
3. Cost savings for schools
4. Variety of ways for students to produce and present work
5. Students more likely to remember their device rather than their pencils
6. Offers a way of supplying, displaying and creating ebooks
7. BYOD is seen as a privilege, promoting increased respect for educational
process
8. Taking away a device is a powerful deterrent/consequence for misbehavior
9. Allows for students and teachers to swap roles
10.Encourages choice of educational tools/apps
11.Provides opportunity to teach responsibility for devices, along with digital
citizenship
Advantages &
Disadvantages
Advantages &
Disadvantages
1. Increased professional development costs for faculty and staff
2. Increased digital divide amongst ‘have’ and ‘have not’ students
3. Apps/tools not common to all platforms
4. Potential for increased parental concerns over ‘safe use’
5. Increase possibility of theft at school
6. Potential damage to device
7. Unwillingness of teachers to take risks trying BYOD
8. Shift from network to user in regards to tech support
9. Device seen as status symbol – peer pressure for certain apps
10.Greater chances of plagiarism
11.Technical infrastructure not capable of meeting influx of wireless
devices
District Policies
& Procedures
District Policies
& Procedures
Rules for tools
don’t make
sense.
Rules for
behaviors
do.
Graphic by http://goo.gl/30W1t
• Dynamic
• A guide, not a wall
• Reflects the community that it
serves and provides for real
world uses and collaboration
• Promotes effective, productive,
and instructionally sound uses of
digital, networked, and
abundant information
environments
• Provides safe digital
environments for learners
• Instills safe practices and habits
among the learning community
• Proactive education
District Policies
& Procedures
• Static
• Provides safe digital
environments for learners by
saying “NO” to most ideas
• Ignores the community it serves
and prevents real world uses
and collaboration
• Stifles innovative uses of
technology for teacher and
student engagement
• Promotes safe practices through
vicarious experiences
• Promotes status quo
District Policies
& Procedures
• Clear statement in policy that use of a device on the school
WiFi might mean their device could be subject to search
and/or seizure under certain circumstances.
• Clear statement regarding what kinds of resources students
will have access to using their own devices under the BYOD
policy.
• Clear disclaimers regarding what the school is responsible
for and not responsible for.
District Policies
& Procedures
District Policies
& Procedures
• District-related policies
• Procedures related to teachers, parents, and students
• Clear statement that use of a BYOD device requires the student's
adherence to the school or district’s acceptable use policy.
• Outline the support and repair policies for the equipment
• Equity of access - Students without a personal device may be provided
access to an appropriate district-owned digital device for instructional
purposes as needed.
• Clear description of the procedures students must follow in order to
obtain access with their device
• Provide statements of clear consequences for student failure to follow
the school or district’s acceptable use policy and BYOD guidelines
District Policies
& Procedures
• Schools establish protection measures that block or filter Internet access to pictures
that are:
– obscene;
– child pornography; or
– harmful to minors (for computers that are accessed by minors).
• Schools are required to adopt and implement an Internet safety policy addressing:
– access by minors to inappropriate matter on the Internet;
– the safety and security of minors when using electronic mail, chat rooms and
other forms of direct electronic communications;
– unauthorized access, including so-called “hacking,” and other unlawful activities
by minors online;
– unauthorized disclosure, use, and dissemination of personal information
regarding minors; and,
– measures restricting minors’ access to materials harmful to them.
• An authorized person may disable the blocking or filtering measure during use by an
adult to enable access for bona fide research or other lawful purposes.
• Schools are required to adopt and enforce a policy to monitor online activities of
minors.
District Policies
& Procedures
District Policies
& Procedures
• Local school and library authorities must determine what matter is
inappropriate for minors
• Specific social networking sites are not automatically considered
“harmful to minors” or assumed to fall into one of the categories that
schools or libraries must block
– The FCC specifically noted that Facebook or MySpace are not
required to be blocked under FCC rules
• Although the FCC rules talk about Internet Safety
Policies, it doesn’t matter what the name of
your actual policy is, as long as it contains the
required elements and was approved by your
board as an official school policy
District Policies
& Procedures
• FCC acknowledged that current rules may not address the filtering
requirements when personal computers and devices are brought to school
• Based on informal conversations, we believe:
– Any school-owned computer/device must be filtered, whether it is used
on campus or off, or used by an adult or student
– Any personal-owned computer/device must be filtered if using school
or library Internet access
– May not be required: Personal-owned computer/devices that use their
own Internet access
• Be careful with this. Just because it’s not required, doesn’t mean
you shouldn’t address it!
• As of now, no exceptions for cellular devices
District Policies
& Procedures
• School-owned devices used at school:
– The law is clear that all school/library owned computers need to
be filtered at school
– The FCC verbally clarified that computers includes all devices with
Internet access (including portable ones)
• School-owned devices used off-campus:
– The current rules do not specifically address this issue. The CIPA
statute says all school owned computers must be filtered and
does not distinguish between on campus and off campus use.
– In 2011 the FCC verbally stated that school owned computers
used off campus must be filtered
– In late April 2012, FCC stated that issue is still ‘open’ and has not
been decided
District Policies
& Procedures
Advice:
Do your absolute best to comply with the spirit of CIPA through
policy and practice. If you are filtering all devices the best you
can and protecting your students from visual depictions that are
obscene, pornographic, or harmful to minors, the FCC should
take this into consideration if you are ever audited.
• Applies to the online collection of personal information of children under the
age of 13.
• It details what a website operator must include in a privacy policy, when and
how to seek verifiable consent from a parent or guardian, and what
responsibilities an operator has to protect children’s privacy and safety online
including restrictions on the marketing to those under 13.
• Applies to individually identifiable information about a child that is collected
online, such as full name, home address, email address, telephone number
or any other information that would allow someone to identify or contact the
child.
• The regulations include several exceptions that allow operators to collect a
child's email address without getting the parent's consent in advance. These
exceptions cover many popular online activities for kids, including contests ,
online newsletters , homework help and electronic postcards .
District Policies
& Procedures
BYOD & COPPA:
http://www.k12blueprint.com/sites/default/files/BYOD-COPPA.pdf
• Generally requires schools to ask for written consent before disclosing a student's
personally identifiable information to individuals other than his or her parents.
• Allows schools to take key steps to maintain school safety.
• In an emergency, FERPA permits school officials to disclose without consent
education records, including personally identifiable information from those records,
to protect the health or safety of students or other individuals.
• Investigative reports and other records created and maintained by these "law
enforcement units" are not considered "education records" subject to FERPA.
• Schools may disclose information from law enforcement unit records to anyone,
including outside law enforcement authorities, without parental consent.
• Schools should designate in their FERPA notification law enforcement officials
employed by the school as ‘school officials’ with a ‘legitimate educational interest’.
• Images of students captured on security videotapes that are maintained by the
school’s law enforcement unit are not considered education records under FERPA.
• FERPA does not prohibit a school official from disclosing information about a student
if the information is obtained through the school official's personal knowledge or
observation, and not from the student's education records.
District Policies
& Procedures
Infrastructure
• Bandwidth, bandwidth, bandwidth
• Check with your provider to see if scalable bandwidth is possible (and
cost)
• Segment networks into guest and repositories of services
• Be prepared to throttle student and teacher network activity to ensure
support of high-priority activities
• Apply for eRATE funds to assist with infrastructure upgrades and
security
• Possibly block specific activities at specific times of the day (such as
YouTube, etc.)
• No magic formula – you have to monitor
• Budget for…and then add some!
Infrastructure
Devices
• Survey students/parents to get an idea of type/number of devices
• Survey teachers to identify their use of specific devices
• Only allow devices that can be inspected by admins
• Discuss with content departments the integration of devices in
curriculum and lessons
• Start collecting device specific resources
• Wifi only? Device with data package?
• Plan on surge of new devices after summer and Christmas
Devices
?
? ?
?
???
?
? ?
?
?
Professional Development
• PD will make or break your BYOD implementation
• Include students (when possible) in teacher PD
• Provide PD in as many methods as possible
• PD must be where the learning occurs (campus-based, throughout the
day, modeling/coaching, etc.)
• Ongoing and sustained (not a one time
event)
• Expectations tied to PD (not a ‘sit and get’)
• Locate your trail blazers and have them
pilot your BYOD – the next year they’ll be
vital as curriculum developers and trainers
• Budget for…and then add some!
Professional Development
Support
• Support is different than professional development
• Support is to bridge the PD sessions
• Create clear, user-friendly wiki or Google Site with various supports
• Must be well organized, concise, easy to access
• Involve teachers and students in creating simple video tutorials (no
longer than 5 minutes!)…possibly during an after-school club
• Develop simple way for teachers to request help
• Students will figure ‘it’ out
• You are doomed if you are expecting teachers to figure ‘it’ out
• Ask the teachers what type(s) of support would be most meaningful
• Make support information available to parents and students (where
appropriate)
Support
PD
Session
PD
Session
PD
Session
support support
Classroom Management
• Set up guidelines such as:
– Use of a device during the school day is clearly at the discretion of
teachers and staff.
– Students are to put the devices away when asked to do so.
– Clear instructions to students that using devices during the
instructional day is in support of their activities.
Personal access for personal reasons is secondary.
• Make clear to students that their use of a device must not disrupt the
learning of others.
• Involve the students in the integration of devices in your lessons.
• Be open to new ideas and new ways of using the tools that come to
your classroom!
Classroom Management
Project & Lesson Inventory
• Does your current curriculum integrate BYOD devices?
• Does your current curriculum provide details on how to differentiate
lessons when multiple devices are used?
• Start a repository for curriculum departments and teachers to add
their projects, lessons, photos, videos, and success stories (behind
firewall?)
• Start simple
• Start slowly
• Solicit samples from trail blazers and highlight their efforts to integrate
BYOD devices
• Refer to this site during PD, faculty meetings, and planning times
Project & Lesson Inventory
Best Practices
Best Practices
• Listen to others (Twitter: @tcea, @CoSN, #BYOD, #edtech, #BYOTchat)
• If you cannot attend a conference, see if you can identify BYOD
presenters and follow up with them after the conference to get
information
• Visit a BYOD school or district
• Clearly define BYOD for your district and WHY you want it
• Establish buy-in from teachers/principals
• Establish a committee with a diverse set of stakeholders
• Plan for roadblocks
• Build unity between curriculum and technology folks
• Involve your librarians and technology teachers
• Involve parents as early as possible
• Document your process and progress
http://goo.gl/4j3By
Best Practices
East Central ISD BYOT Initiative: http://bit.ly/ecbyot
http://goo.gl/4j3By
Best Practices
Join the BYOT/BYOD Group
http://goo.gl/4j3By
How to Join the Group
1. Go to tcea.org and click on
the Login button. Enter
your info and log in.
2. Click on the Social
Community link in the left
menu bar.
3. Click on the Groups menu
link and search for BYOD.
4. Click the Join Group link.
How to Join the Group
1. Go to tcea.org and click
on the Login button. Enter
your info and log in.
2. Click on the Social
Community link in the left
menu bar.
3. Click on the Groups menu
link and search for
BYOD.
4. Click the Join Group link.
Investigate
1. Go to the BYOD/BYOT
Group
2. Review at least 2
resources
3. Be ready to share with
the group
Investigate
20 BYOD Resources for the 21st Century School
http://goo.gl/gVwbc
BYOD Questions to Consider
http://goo.gl/229WQ
Lessons Learned from a BYOD Implementation
http://goo.gl/KDXpYF
Surviving a BYOD
Implementation
5 Areas of Consideration for Developing a BYOD Policy for Your School or District
http://the21stcenturyprincipal.blogspot.com/2012/02/5-areas-of-consideration-for-developing.html
6 Questions and 6 Actions to Prepare for Bring Your Own Device
http://www.lightspeedsystems.com/pdf/BYOD-Prep-List.pdf
7 Myths about BYOD Debunked
http://thejournal.com/articles/2011/11/09/7-byod-myths.aspx
7 Questions for Bringing Your Own Device to School
http://barbarabray.net/2011/07/28/7-questions-for-bringing-your-own-device-to-school/
AT&T Smart Controls – wireless parental controls
http://www.att.net/smartcontrols-WirelessParentalControls
Booker T. Washington BYOD Brochure
http://www.escambia.k12.fl.us/schscnts/wash/BYOD%20Brochure%20final.pdf
Bring Your Own Device Prompts School Infrastructure Investments
http://www.convergemag.com/classtech/BYOD-Forsyth-Infrastructure.html
BYOD Questions to Consider
http://1to1schools.net/2012/04/byod-questions-to-consider/
BYOD Toolbox
http://www.themobilenative.blogspot.com/2012/01/byod-bring-your-own-device-toolbox.html
Chequamegon School District BYOD site
http://infotech.csdk12.net/byod.html
Children’s Internet Protection Act (CIPA)
http://www.fcc.gov/guides/childrens-internet-protection-act
Resources
Children’s Online Privacy Protection Act (COPPA)
http://business.ftc.gov/documents/bus45-how-comply-childrens-online-privacy-protection-rule
Creating a Robust and Safe BYOD Program
http://www.districtadministration.com/article/creating-robust-and-safe-byod-program
ETEC 510 BYOD Wiki
http://sites.wiki.ubc.ca/etec510/BYOD_-_Bring_Your_Own_Device
Family Educational Rights and Privacy Act (FERPA)
http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html
Forsyth County Schools – Technology & Information Services
http://www.forsyth.k12.ga.us/site/Default.aspx?PageID=825
Hanover Public School BYOD Site
http://byod.hanoverpublic.org/
How the CIO Can Establish a GYOD Usage Policy
http://www.ciodashboard.com/it-governance/how-the-cio-can-establish-a-byod-usage-policy/
Inside a “Bring Your Own Device” Program
http://www.eschoolnews.com/2011/10/11/inside-a-bring-your-own-device-program/
Marlboro Township Public Schools – BYOD Pilot Program
http://www.marlboro.k12.nj.us/district.cfm?subpage=46037
Verizon Parental Controls Center
http://parentalcontrolcenter.com/
Warwick School District – BYOD Personal Device FAQ
http://www.warwick.k12.pa.us/website/orgmodule.php?deptid=114&schoolid=0007&mid=1429
Welcome to School AUP 2.0
http://landmark-project.com/aup20/pmwiki.php?n=Main.HomePage
Resources

More Related Content

What's hot

Parent presentation website
Parent presentation websiteParent presentation website
Parent presentation website
pearland_tech
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbook
JG4191
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy project
Rachel Nachman
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
arhodes
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
sappingtonkr
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2
guest594ea
 
Th digital divide by Maha Aljehani
Th digital divide by Maha AljehaniTh digital divide by Maha Aljehani
Th digital divide by Maha Aljehani
MahaAljehani
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
jlknight
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
Gabriella Maree Wheeler
 

What's hot (20)

Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD Plan
 
Parent presentation website
Parent presentation websiteParent presentation website
Parent presentation website
 
Challenger 201311 handbook
Challenger 201311 handbookChallenger 201311 handbook
Challenger 201311 handbook
 
Rachel nachman aup policy project
Rachel nachman   aup policy projectRachel nachman   aup policy project
Rachel nachman aup policy project
 
Fall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting pptFall 2011 onslow connect parent meeting ppt
Fall 2011 onslow connect parent meeting ppt
 
Breaking down the barriers
Breaking down the barriersBreaking down the barriers
Breaking down the barriers
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
 
Cybersafety
Cybersafety Cybersafety
Cybersafety
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic DialogueNL NIS 2003 - Connecting the Home and School through Electronic Dialogue
NL NIS 2003 - Connecting the Home and School through Electronic Dialogue
 
Ruth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital WorldRuth Hammond - Saftguarding Children in a Digital World
Ruth Hammond - Saftguarding Children in a Digital World
 
E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2E Safety Policy Mar 09 Draft 1.2
E Safety Policy Mar 09 Draft 1.2
 
Th digital divide by Maha Aljehani
Th digital divide by Maha AljehaniTh digital divide by Maha Aljehani
Th digital divide by Maha Aljehani
 
Surviving a BYOD Implementation - ISTE 2017
Surviving a BYOD Implementation - ISTE 2017Surviving a BYOD Implementation - ISTE 2017
Surviving a BYOD Implementation - ISTE 2017
 
Legal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroomLegal and ethical issues for using technology in the classroom
Legal and ethical issues for using technology in the classroom
 
A Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in EducationA Guide to Acceptable USe Policies in Education
A Guide to Acceptable USe Policies in Education
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204Acceptable use policy__ecomp_6204
Acceptable use policy__ecomp_6204
 
Acceptable use policy CHFHS
Acceptable use policy CHFHSAcceptable use policy CHFHS
Acceptable use policy CHFHS
 

Viewers also liked

Scrum Reference Card
Scrum Reference CardScrum Reference Card
Scrum Reference Card
enderturan
 
havcs-410-101 a-2-10-srt-pg_3
havcs-410-101 a-2-10-srt-pg_3havcs-410-101 a-2-10-srt-pg_3
havcs-410-101 a-2-10-srt-pg_3
raryal
 
U10 sss swenv-pm
U10 sss swenv-pmU10 sss swenv-pm
U10 sss swenv-pm
Le Thi
 
Embedded Android Workshop at ABS 2014
Embedded Android Workshop at ABS 2014Embedded Android Workshop at ABS 2014
Embedded Android Workshop at ABS 2014
Opersys inc.
 
Ssm400rn
Ssm400rnSsm400rn
Ssm400rn
sossa
 
大众点评网 Web开发之路
大众点评网 Web开发之路大众点评网 Web开发之路
大众点评网 Web开发之路
alcoholwang
 
The Implausibility of Secrecy - Mark Fenster - Author - University of Florid...
The Implausibility of Secrecy -  Mark Fenster - Author - University of Florid...The Implausibility of Secrecy -  Mark Fenster - Author - University of Florid...
The Implausibility of Secrecy - Mark Fenster - Author - University of Florid...
Linda Cadigan
 

Viewers also liked (20)

Scrum Reference Card
Scrum Reference CardScrum Reference Card
Scrum Reference Card
 
havcs-410-101 a-2-10-srt-pg_3
havcs-410-101 a-2-10-srt-pg_3havcs-410-101 a-2-10-srt-pg_3
havcs-410-101 a-2-10-srt-pg_3
 
Open erp technical_memento_v0.6.3_a4
Open erp technical_memento_v0.6.3_a4Open erp technical_memento_v0.6.3_a4
Open erp technical_memento_v0.6.3_a4
 
U10 sss swenv-pm
U10 sss swenv-pmU10 sss swenv-pm
U10 sss swenv-pm
 
Road to Government 2.0: Technological Problems and Solutions for Transparency...
Road to Government 2.0: Technological Problems and Solutions for Transparency...Road to Government 2.0: Technological Problems and Solutions for Transparency...
Road to Government 2.0: Technological Problems and Solutions for Transparency...
 
Embedded Android Workshop at ABS 2014
Embedded Android Workshop at ABS 2014Embedded Android Workshop at ABS 2014
Embedded Android Workshop at ABS 2014
 
Assistive Technology Tools by R. Williams
Assistive Technology Tools by R. Williams Assistive Technology Tools by R. Williams
Assistive Technology Tools by R. Williams
 
Ssm400rn
Ssm400rnSsm400rn
Ssm400rn
 
Usabilidade em RSS (por Bruno Maranhão)
Usabilidade em RSS (por Bruno Maranhão)Usabilidade em RSS (por Bruno Maranhão)
Usabilidade em RSS (por Bruno Maranhão)
 
Linux Kernel - System Calls - Modules - Drivers
Linux Kernel - System Calls - Modules - DriversLinux Kernel - System Calls - Modules - Drivers
Linux Kernel - System Calls - Modules - Drivers
 
03 - Aplicações web com ASP.net v1.0
03 - Aplicações web com ASP.net v1.003 - Aplicações web com ASP.net v1.0
03 - Aplicações web com ASP.net v1.0
 
[Did you know] 모바일 전략과 웹앱 20130703
[Did you know] 모바일 전략과 웹앱  20130703[Did you know] 모바일 전략과 웹앱  20130703
[Did you know] 모바일 전략과 웹앱 20130703
 
ned TELE-audiovision-1309
ned TELE-audiovision-1309ned TELE-audiovision-1309
ned TELE-audiovision-1309
 
Art and Science of Web Sites Performance: A Front-end Approach
Art and Science of Web Sites Performance: A Front-end ApproachArt and Science of Web Sites Performance: A Front-end Approach
Art and Science of Web Sites Performance: A Front-end Approach
 
大众点评网 Web开发之路
大众点评网 Web开发之路大众点评网 Web开发之路
大众点评网 Web开发之路
 
Экосистема Common Lisp
Экосистема Common LispЭкосистема Common Lisp
Экосистема Common Lisp
 
An introduction to php shells
An introduction to php shellsAn introduction to php shells
An introduction to php shells
 
Bitcoin 101
Bitcoin 101Bitcoin 101
Bitcoin 101
 
The Implausibility of Secrecy - Mark Fenster - Author - University of Florid...
The Implausibility of Secrecy -  Mark Fenster - Author - University of Florid...The Implausibility of Secrecy -  Mark Fenster - Author - University of Florid...
The Implausibility of Secrecy - Mark Fenster - Author - University of Florid...
 
Melbourne User Group OAK and MongoDB
Melbourne User Group OAK and MongoDBMelbourne User Group OAK and MongoDB
Melbourne User Group OAK and MongoDB
 

Similar to Surviving a BYOD Implementation

NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
emilyensign
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
emilyensign
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
Debbie Oliver
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
Carlos Fernandez
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
1 to 1 pedagogy stakeholders learning spaces
1 to 1 pedagogy stakeholders learning spaces1 to 1 pedagogy stakeholders learning spaces
1 to 1 pedagogy stakeholders learning spaces
Mark Richardson
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
spaul6414
 
Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02
carrietales
 
Social media policy
Social media policySocial media policy
Social media policy
Har1982
 

Similar to Surviving a BYOD Implementation (20)

Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]SHS BYOD acceptable use 2013[1]
SHS BYOD acceptable use 2013[1]
 
Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15Social Media for School Districts - OTA 15
Social Media for School Districts - OTA 15
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Chapter6
Chapter6Chapter6
Chapter6
 
Surviving a BYOD Implementation - Tots Frisco 16
Surviving a BYOD Implementation - Tots Frisco 16Surviving a BYOD Implementation - Tots Frisco 16
Surviving a BYOD Implementation - Tots Frisco 16
 
Acceptable Use Policy
Acceptable Use PolicyAcceptable Use Policy
Acceptable Use Policy
 
Text me the answer fetc 2013
Text me the answer  fetc 2013Text me the answer  fetc 2013
Text me the answer fetc 2013
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Final project CMT- digital learning program for children in Kenya
Final project   CMT- digital learning program for children in KenyaFinal project   CMT- digital learning program for children in Kenya
Final project CMT- digital learning program for children in Kenya
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
1 to 1 pedagogy stakeholders learning spaces
1 to 1 pedagogy stakeholders learning spaces1 to 1 pedagogy stakeholders learning spaces
1 to 1 pedagogy stakeholders learning spaces
 
Web Policies Presentation
Web Policies PresentationWeb Policies Presentation
Web Policies Presentation
 
BYOD/BYOT
BYOD/BYOTBYOD/BYOT
BYOD/BYOT
 
Aup
AupAup
Aup
 
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
Jisc RSC Eastern Technical Managers forum June 2013 'BYOD Tech Managers forum'
 
Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02Finalprojectedit654rev phpapp02
Finalprojectedit654rev phpapp02
 
Social media policy
Social media policySocial media policy
Social media policy
 

More from Diana Benner

More from Diana Benner (20)

Googlelicious Learning with Google Drawings - TCEA 2018
Googlelicious Learning with Google Drawings - TCEA 2018Googlelicious Learning with Google Drawings - TCEA 2018
Googlelicious Learning with Google Drawings - TCEA 2018
 
Super Secrets of Google - TCEA 2018
Super Secrets of Google - TCEA 2018Super Secrets of Google - TCEA 2018
Super Secrets of Google - TCEA 2018
 
Using Formative Assessment Strategies to Inform Instruction - TCEA 2018
Using Formative Assessment Strategies to Inform Instruction - TCEA 2018Using Formative Assessment Strategies to Inform Instruction - TCEA 2018
Using Formative Assessment Strategies to Inform Instruction - TCEA 2018
 
Googlicious Ways to use Google Drawing in the Classroom - Chromebook Academy 17
Googlicious Ways to use Google Drawing in the Classroom - Chromebook Academy 17Googlicious Ways to use Google Drawing in the Classroom - Chromebook Academy 17
Googlicious Ways to use Google Drawing in the Classroom - Chromebook Academy 17
 
T-TESS and the Blended Learning Environment - Tots Arlington 17
T-TESS and the Blended Learning Environment - Tots Arlington 17T-TESS and the Blended Learning Environment - Tots Arlington 17
T-TESS and the Blended Learning Environment - Tots Arlington 17
 
Googlicious Ways to use Google Drawing in the Classroom - Tots Arlington 17
Googlicious Ways to use Google Drawing in the Classroom - Tots Arlington 17Googlicious Ways to use Google Drawing in the Classroom - Tots Arlington 17
Googlicious Ways to use Google Drawing in the Classroom - Tots Arlington 17
 
Emoji-cize Learning - Tots Arlington 17
Emoji-cize Learning - Tots Arlington 17Emoji-cize Learning - Tots Arlington 17
Emoji-cize Learning - Tots Arlington 17
 
Flip Your Grid with Video-Powered Reflection - Tots Arlington 17
Flip Your Grid with Video-Powered Reflection - Tots Arlington 17Flip Your Grid with Video-Powered Reflection - Tots Arlington 17
Flip Your Grid with Video-Powered Reflection - Tots Arlington 17
 
Killer Chrome Tips and Tricks you Should Know - Tots Arlington 17
Killer Chrome Tips and Tricks you Should Know - Tots Arlington 17Killer Chrome Tips and Tricks you Should Know - Tots Arlington 17
Killer Chrome Tips and Tricks you Should Know - Tots Arlington 17
 
Boost Literacy with Digital Tools - Tots Arlington 17
Boost Literacy with Digital Tools - Tots Arlington 17Boost Literacy with Digital Tools - Tots Arlington 17
Boost Literacy with Digital Tools - Tots Arlington 17
 
Classroom Icebreakers for Back to School Demo Slam - ISTE 17
Classroom Icebreakers for Back to School Demo Slam - ISTE 17Classroom Icebreakers for Back to School Demo Slam - ISTE 17
Classroom Icebreakers for Back to School Demo Slam - ISTE 17
 
Top Ingredients for a Blended Learning Classroom Demo Slam - ISTE 17
Top Ingredients for a Blended Learning Classroom Demo Slam - ISTE 17Top Ingredients for a Blended Learning Classroom Demo Slam - ISTE 17
Top Ingredients for a Blended Learning Classroom Demo Slam - ISTE 17
 
T-TESS and the Blended Learning Environment - Tots Galveston 17
T-TESS and the Blended Learning Environment - Tots Galveston 17T-TESS and the Blended Learning Environment - Tots Galveston 17
T-TESS and the Blended Learning Environment - Tots Galveston 17
 
Emoji-cize Learning
Emoji-cize LearningEmoji-cize Learning
Emoji-cize Learning
 
Boost Literacy with Digital Tools - Tots Galveston 17
Boost Literacy with Digital Tools - Tots Galveston 17Boost Literacy with Digital Tools - Tots Galveston 17
Boost Literacy with Digital Tools - Tots Galveston 17
 
Flip your Grid with Video-Powered Reflection - Tots Galveston 17
Flip your Grid with Video-Powered Reflection - Tots Galveston 17Flip your Grid with Video-Powered Reflection - Tots Galveston 17
Flip your Grid with Video-Powered Reflection - Tots Galveston 17
 
Killer Chrome Tips and Tricks You Should Know - Tots Galveston 17
Killer Chrome Tips and Tricks You Should Know - Tots Galveston 17Killer Chrome Tips and Tricks You Should Know - Tots Galveston 17
Killer Chrome Tips and Tricks You Should Know - Tots Galveston 17
 
Googlicious Ways to use Google Drawing in the Classroom - Tots Galveston 17
Googlicious Ways to use Google Drawing in the Classroom - Tots Galveston 17Googlicious Ways to use Google Drawing in the Classroom - Tots Galveston 17
Googlicious Ways to use Google Drawing in the Classroom - Tots Galveston 17
 
Express Yourself with Sway - Tots Galveston 17
Express Yourself with Sway - Tots Galveston 17Express Yourself with Sway - Tots Galveston 17
Express Yourself with Sway - Tots Galveston 17
 
Mix Up Your E-learning
Mix Up Your E-learningMix Up Your E-learning
Mix Up Your E-learning
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Surviving a BYOD Implementation

  • 2. Diana Benner Director of Professional Development 972-275-9251 dbenner@tcea.org @diben http://www.facebook.com/tcea.org http://twitter.com/tcea http://tcea.mymemberfuse.com/
  • 3. Poll Question Which is/are true for you regarding a BYOD (Bring Your Own Device) implementation? Select all that apply.  My school/district has already completed a BYOD implementation  My school/district is in the process of a BYOD implementation  My school/district is considering/planning a BYOD implementation  I’m not sure if my school/district is considering a BYOD implementation  I’m very familiar with the BYOD topic.  I’m somewhat familiar with the BYOD topic.  I’m new to the BYOD topic.
  • 4. 1. BYOD deepens the digital divide. 2. Teachers must be in control in order for a BYOD to be successful. 3. BYOD will result in lessons geared toward the weakest device. 4. BYOD will necessitate the standardization of apps and software across all devices. 5. A BYOD implementations takes lots of planning. Which of the following is/are myths regarding BYOD? Share the number and your reasoning.
  • 5.
  • 6. Project & Lesson Inventory Best Practices Classroom Management District Policies & Procedures Infrastructure Professional Development Devices Support TOP SECRET
  • 8. 1. Learners are more engaged in connected classrooms 2. Increased opportunities for introverted students to participate in discussions 3. Cost savings for schools 4. Variety of ways for students to produce and present work 5. Students more likely to remember their device rather than their pencils 6. Offers a way of supplying, displaying and creating ebooks 7. BYOD is seen as a privilege, promoting increased respect for educational process 8. Taking away a device is a powerful deterrent/consequence for misbehavior 9. Allows for students and teachers to swap roles 10.Encourages choice of educational tools/apps 11.Provides opportunity to teach responsibility for devices, along with digital citizenship Advantages & Disadvantages
  • 9. Advantages & Disadvantages 1. Increased professional development costs for faculty and staff 2. Increased digital divide amongst ‘have’ and ‘have not’ students 3. Apps/tools not common to all platforms 4. Potential for increased parental concerns over ‘safe use’ 5. Increase possibility of theft at school 6. Potential damage to device 7. Unwillingness of teachers to take risks trying BYOD 8. Shift from network to user in regards to tech support 9. Device seen as status symbol – peer pressure for certain apps 10.Greater chances of plagiarism 11.Technical infrastructure not capable of meeting influx of wireless devices
  • 11. District Policies & Procedures Rules for tools don’t make sense. Rules for behaviors do. Graphic by http://goo.gl/30W1t
  • 12. • Dynamic • A guide, not a wall • Reflects the community that it serves and provides for real world uses and collaboration • Promotes effective, productive, and instructionally sound uses of digital, networked, and abundant information environments • Provides safe digital environments for learners • Instills safe practices and habits among the learning community • Proactive education District Policies & Procedures • Static • Provides safe digital environments for learners by saying “NO” to most ideas • Ignores the community it serves and prevents real world uses and collaboration • Stifles innovative uses of technology for teacher and student engagement • Promotes safe practices through vicarious experiences • Promotes status quo
  • 14. • Clear statement in policy that use of a device on the school WiFi might mean their device could be subject to search and/or seizure under certain circumstances. • Clear statement regarding what kinds of resources students will have access to using their own devices under the BYOD policy. • Clear disclaimers regarding what the school is responsible for and not responsible for. District Policies & Procedures
  • 16. • District-related policies • Procedures related to teachers, parents, and students • Clear statement that use of a BYOD device requires the student's adherence to the school or district’s acceptable use policy. • Outline the support and repair policies for the equipment • Equity of access - Students without a personal device may be provided access to an appropriate district-owned digital device for instructional purposes as needed. • Clear description of the procedures students must follow in order to obtain access with their device • Provide statements of clear consequences for student failure to follow the school or district’s acceptable use policy and BYOD guidelines District Policies & Procedures
  • 17. • Schools establish protection measures that block or filter Internet access to pictures that are: – obscene; – child pornography; or – harmful to minors (for computers that are accessed by minors). • Schools are required to adopt and implement an Internet safety policy addressing: – access by minors to inappropriate matter on the Internet; – the safety and security of minors when using electronic mail, chat rooms and other forms of direct electronic communications; – unauthorized access, including so-called “hacking,” and other unlawful activities by minors online; – unauthorized disclosure, use, and dissemination of personal information regarding minors; and, – measures restricting minors’ access to materials harmful to them. • An authorized person may disable the blocking or filtering measure during use by an adult to enable access for bona fide research or other lawful purposes. • Schools are required to adopt and enforce a policy to monitor online activities of minors. District Policies & Procedures
  • 18. District Policies & Procedures • Local school and library authorities must determine what matter is inappropriate for minors • Specific social networking sites are not automatically considered “harmful to minors” or assumed to fall into one of the categories that schools or libraries must block – The FCC specifically noted that Facebook or MySpace are not required to be blocked under FCC rules • Although the FCC rules talk about Internet Safety Policies, it doesn’t matter what the name of your actual policy is, as long as it contains the required elements and was approved by your board as an official school policy
  • 19. District Policies & Procedures • FCC acknowledged that current rules may not address the filtering requirements when personal computers and devices are brought to school • Based on informal conversations, we believe: – Any school-owned computer/device must be filtered, whether it is used on campus or off, or used by an adult or student – Any personal-owned computer/device must be filtered if using school or library Internet access – May not be required: Personal-owned computer/devices that use their own Internet access • Be careful with this. Just because it’s not required, doesn’t mean you shouldn’t address it! • As of now, no exceptions for cellular devices
  • 20. District Policies & Procedures • School-owned devices used at school: – The law is clear that all school/library owned computers need to be filtered at school – The FCC verbally clarified that computers includes all devices with Internet access (including portable ones) • School-owned devices used off-campus: – The current rules do not specifically address this issue. The CIPA statute says all school owned computers must be filtered and does not distinguish between on campus and off campus use. – In 2011 the FCC verbally stated that school owned computers used off campus must be filtered – In late April 2012, FCC stated that issue is still ‘open’ and has not been decided
  • 21. District Policies & Procedures Advice: Do your absolute best to comply with the spirit of CIPA through policy and practice. If you are filtering all devices the best you can and protecting your students from visual depictions that are obscene, pornographic, or harmful to minors, the FCC should take this into consideration if you are ever audited.
  • 22. • Applies to the online collection of personal information of children under the age of 13. • It details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children’s privacy and safety online including restrictions on the marketing to those under 13. • Applies to individually identifiable information about a child that is collected online, such as full name, home address, email address, telephone number or any other information that would allow someone to identify or contact the child. • The regulations include several exceptions that allow operators to collect a child's email address without getting the parent's consent in advance. These exceptions cover many popular online activities for kids, including contests , online newsletters , homework help and electronic postcards . District Policies & Procedures BYOD & COPPA: http://www.k12blueprint.com/sites/default/files/BYOD-COPPA.pdf
  • 23. • Generally requires schools to ask for written consent before disclosing a student's personally identifiable information to individuals other than his or her parents. • Allows schools to take key steps to maintain school safety. • In an emergency, FERPA permits school officials to disclose without consent education records, including personally identifiable information from those records, to protect the health or safety of students or other individuals. • Investigative reports and other records created and maintained by these "law enforcement units" are not considered "education records" subject to FERPA. • Schools may disclose information from law enforcement unit records to anyone, including outside law enforcement authorities, without parental consent. • Schools should designate in their FERPA notification law enforcement officials employed by the school as ‘school officials’ with a ‘legitimate educational interest’. • Images of students captured on security videotapes that are maintained by the school’s law enforcement unit are not considered education records under FERPA. • FERPA does not prohibit a school official from disclosing information about a student if the information is obtained through the school official's personal knowledge or observation, and not from the student's education records. District Policies & Procedures
  • 25. • Bandwidth, bandwidth, bandwidth • Check with your provider to see if scalable bandwidth is possible (and cost) • Segment networks into guest and repositories of services • Be prepared to throttle student and teacher network activity to ensure support of high-priority activities • Apply for eRATE funds to assist with infrastructure upgrades and security • Possibly block specific activities at specific times of the day (such as YouTube, etc.) • No magic formula – you have to monitor • Budget for…and then add some! Infrastructure
  • 27. • Survey students/parents to get an idea of type/number of devices • Survey teachers to identify their use of specific devices • Only allow devices that can be inspected by admins • Discuss with content departments the integration of devices in curriculum and lessons • Start collecting device specific resources • Wifi only? Device with data package? • Plan on surge of new devices after summer and Christmas Devices ? ? ? ? ??? ? ? ? ? ?
  • 29. • PD will make or break your BYOD implementation • Include students (when possible) in teacher PD • Provide PD in as many methods as possible • PD must be where the learning occurs (campus-based, throughout the day, modeling/coaching, etc.) • Ongoing and sustained (not a one time event) • Expectations tied to PD (not a ‘sit and get’) • Locate your trail blazers and have them pilot your BYOD – the next year they’ll be vital as curriculum developers and trainers • Budget for…and then add some! Professional Development
  • 31. • Support is different than professional development • Support is to bridge the PD sessions • Create clear, user-friendly wiki or Google Site with various supports • Must be well organized, concise, easy to access • Involve teachers and students in creating simple video tutorials (no longer than 5 minutes!)…possibly during an after-school club • Develop simple way for teachers to request help • Students will figure ‘it’ out • You are doomed if you are expecting teachers to figure ‘it’ out • Ask the teachers what type(s) of support would be most meaningful • Make support information available to parents and students (where appropriate) Support PD Session PD Session PD Session support support
  • 33. • Set up guidelines such as: – Use of a device during the school day is clearly at the discretion of teachers and staff. – Students are to put the devices away when asked to do so. – Clear instructions to students that using devices during the instructional day is in support of their activities. Personal access for personal reasons is secondary. • Make clear to students that their use of a device must not disrupt the learning of others. • Involve the students in the integration of devices in your lessons. • Be open to new ideas and new ways of using the tools that come to your classroom! Classroom Management
  • 34. Project & Lesson Inventory
  • 35. • Does your current curriculum integrate BYOD devices? • Does your current curriculum provide details on how to differentiate lessons when multiple devices are used? • Start a repository for curriculum departments and teachers to add their projects, lessons, photos, videos, and success stories (behind firewall?) • Start simple • Start slowly • Solicit samples from trail blazers and highlight their efforts to integrate BYOD devices • Refer to this site during PD, faculty meetings, and planning times Project & Lesson Inventory
  • 37. Best Practices • Listen to others (Twitter: @tcea, @CoSN, #BYOD, #edtech, #BYOTchat) • If you cannot attend a conference, see if you can identify BYOD presenters and follow up with them after the conference to get information • Visit a BYOD school or district • Clearly define BYOD for your district and WHY you want it • Establish buy-in from teachers/principals • Establish a committee with a diverse set of stakeholders • Plan for roadblocks • Build unity between curriculum and technology folks • Involve your librarians and technology teachers • Involve parents as early as possible • Document your process and progress
  • 38. http://goo.gl/4j3By Best Practices East Central ISD BYOT Initiative: http://bit.ly/ecbyot
  • 39. http://goo.gl/4j3By Best Practices Join the BYOT/BYOD Group http://goo.gl/4j3By How to Join the Group 1. Go to tcea.org and click on the Login button. Enter your info and log in. 2. Click on the Social Community link in the left menu bar. 3. Click on the Groups menu link and search for BYOD. 4. Click the Join Group link.
  • 40. How to Join the Group 1. Go to tcea.org and click on the Login button. Enter your info and log in. 2. Click on the Social Community link in the left menu bar. 3. Click on the Groups menu link and search for BYOD. 4. Click the Join Group link. Investigate 1. Go to the BYOD/BYOT Group 2. Review at least 2 resources 3. Be ready to share with the group
  • 41. Investigate 20 BYOD Resources for the 21st Century School http://goo.gl/gVwbc BYOD Questions to Consider http://goo.gl/229WQ Lessons Learned from a BYOD Implementation http://goo.gl/KDXpYF
  • 42.
  • 44. 5 Areas of Consideration for Developing a BYOD Policy for Your School or District http://the21stcenturyprincipal.blogspot.com/2012/02/5-areas-of-consideration-for-developing.html 6 Questions and 6 Actions to Prepare for Bring Your Own Device http://www.lightspeedsystems.com/pdf/BYOD-Prep-List.pdf 7 Myths about BYOD Debunked http://thejournal.com/articles/2011/11/09/7-byod-myths.aspx 7 Questions for Bringing Your Own Device to School http://barbarabray.net/2011/07/28/7-questions-for-bringing-your-own-device-to-school/ AT&T Smart Controls – wireless parental controls http://www.att.net/smartcontrols-WirelessParentalControls Booker T. Washington BYOD Brochure http://www.escambia.k12.fl.us/schscnts/wash/BYOD%20Brochure%20final.pdf Bring Your Own Device Prompts School Infrastructure Investments http://www.convergemag.com/classtech/BYOD-Forsyth-Infrastructure.html BYOD Questions to Consider http://1to1schools.net/2012/04/byod-questions-to-consider/ BYOD Toolbox http://www.themobilenative.blogspot.com/2012/01/byod-bring-your-own-device-toolbox.html Chequamegon School District BYOD site http://infotech.csdk12.net/byod.html Children’s Internet Protection Act (CIPA) http://www.fcc.gov/guides/childrens-internet-protection-act Resources
  • 45. Children’s Online Privacy Protection Act (COPPA) http://business.ftc.gov/documents/bus45-how-comply-childrens-online-privacy-protection-rule Creating a Robust and Safe BYOD Program http://www.districtadministration.com/article/creating-robust-and-safe-byod-program ETEC 510 BYOD Wiki http://sites.wiki.ubc.ca/etec510/BYOD_-_Bring_Your_Own_Device Family Educational Rights and Privacy Act (FERPA) http://www2.ed.gov/policy/gen/guid/fpco/ferpa/index.html Forsyth County Schools – Technology & Information Services http://www.forsyth.k12.ga.us/site/Default.aspx?PageID=825 Hanover Public School BYOD Site http://byod.hanoverpublic.org/ How the CIO Can Establish a GYOD Usage Policy http://www.ciodashboard.com/it-governance/how-the-cio-can-establish-a-byod-usage-policy/ Inside a “Bring Your Own Device” Program http://www.eschoolnews.com/2011/10/11/inside-a-bring-your-own-device-program/ Marlboro Township Public Schools – BYOD Pilot Program http://www.marlboro.k12.nj.us/district.cfm?subpage=46037 Verizon Parental Controls Center http://parentalcontrolcenter.com/ Warwick School District – BYOD Personal Device FAQ http://www.warwick.k12.pa.us/website/orgmodule.php?deptid=114&schoolid=0007&mid=1429 Welcome to School AUP 2.0 http://landmark-project.com/aup20/pmwiki.php?n=Main.HomePage Resources

Editor's Notes

  1. Discussion starter
  2. Implementing a BYOD doesn’t have to be a gamble
  3. Information to be successful is NOT top secret. There have been enough to blaze the trail that you should be able to plan a successful implementation.