BYOD Policy Sample 2 - Free Download
4.2, 3835 votes
Please vote for this template if it helps you.
2 Why Support Pervasive BYOD
3 Preparing the Network
3 Addressing Security Concerns
4 Best Practices
Table of Contents
Adapting to the ﬂood of personal mobile computing devices
accessing campus networks
e “bring your own device” (BYOD) movement is relatively
new in corporate and K–12 environments, but colleges and
universities have been adapting their networks and policies
to accommodate personal mobile computing devices for quite
some time. Undergraduate and graduate students have been
bringing their own wireless-enabled notebook computers and
smartphones to campus since the dawn of the 21st century.
What has changed in recent years is the quantity of mobile
devices that these students now carry and the fact that so
many of them expect their institutions to provide ubiquitous,
reliable wireless connectivity.
ese days, many students, faculty and staﬀ members
arrive on campus with a notebook computer, smartphone,
an MP3 player and sometimes a tablet, e-reader or other
IP-connected gadget. And they presume that they will be
able to use any and all of these personal devices to access the
network and its resources in real time, from anywhere.
Colleges and universities are struggling to meet these
expectations. One reason is that administrative priorities often
are at odds with this rapidly evolving culture of 24x7 access.
According to CDW•G’s 2011 21st Century Campus Report,
22 percent of administrators cited the use of technology to
enhance student learning as one of their top two priorities for
the 2011–2012 academic year; a mere 12 percent said the same
about improving and enhancing IT.
Within the constraints of tight budgets, higher education
leaders are now rethinking their IT strategies in order to
meet these expectations of anytime, anywhere access
and technology-enhanced learning. Many institutions need
to upgrade their network capacity and performance by
increasing bandwidth, adding access points, boosting their
network management capabilities and addressing security
concerns. ey also must make core applications and