SlideShare a Scribd company logo
BUILDING A SUCCESSFUL BYOD
PROGRAM:
A NEW PARADIGM FOR THE
EDUCATION COMMUNITY
www.iKeepSafe.org/BYOD
*
Agenda
• About iKeepSafe
•
•
•
•

BYOD Roundtable
Stakeholder Responsibilities
Implementation
Discussion
www.iKeepSafe.org/BYOD
About iKeepSafe
Dedicated to promoting the health and safety of
youth online
•

Curriculum materials to teach Internet safety, ethics
and the healthy use of technology

•

Generation Safe™ suite for school staff:
professional development, self assessment survey
and incident response tools

•

BEaPRO™ resources to help parents teach their
children to become safe, ethical, and responsible
digital citizens
*
Developing the BYOD
Materials
• Growing awareness of challenges around
BYOD
• Privacy, safety, security, access, device
management, professional development,
infrastructure, learning content, policies,
funding, and technical support

• iKeepSafe invited a variety of stakeholders and
thought leaders to join a roundtable discussion

*
BYOD Roundtable
• Linnette Attai, President and Founder, PlayWell, LLC
• Julie Baker, Marketing Content Manager, Kaspersky Lab
• Kyle Brumbaugh, Member of the Board of Directors, Computer Using Educators (CUE)
• Elizabeth Calhoon, Academic Technology Specialist

• Jeff Gaffney, Director of Sales-SLED, Kaspersky Lab
• Camilla Gagliolo, Program Director, ISTE
• Frank Gallagher, Executive Director, Cable in the Classroom
• Nancy Gifford, Counsel, Wiggen & Dana LLP
• Marsali Hancock, President and CEO, iKeepSafe

• Mary Heston, Social Media Director, Wired Mom
• Charles Leitch, Founding Principal, Patterson Buchanan Fobes & Leitch LLP
• Amber Lindsay, Director of Program Development and Outreach, iKeepSafe
• Sally Linford, Director of Communications, iKeepSafe
• Ethan Parry, Director of Public Relations, iKeepSafe
• Tim Sullivan, Publisher, Parent Teacher Organization
• Glen Warren, VP of Government Relations, California School Library Association (Chair)
*
BYOD Roundtable Goals
• Explore building a successful BYOD program
• Consider all stakeholder challenges
• Examine benefits and complexities of
implementing a BYOD culture in schools
• Special attention paid to issues around civil
liberties, access, FERPA, CIPA and updated
COPPA amendments

*
Outcomes
Intended outcomes:
•

Develop a launch pad for administrators, policy
makers, and educators to prepare
students, faculty, staff and parents to thrive in this
new educational environment

•

Assist schools with integrating a wide range of
devices while minimizing risk

*
Successful BYOD Environments
•
•
•
•

Access
Counselors
Law Enforcement

Vision and clear
actionable
policy

School
Board
Superintendent

•

Vision, policy, a
nd support

•

Community

Vision, training,
and incident
response

Supported
Student
•

Clear
expectations

Parent

Administrator

Teacher
•

Management
and preparation
School Board
• Develop clear, actionable
policies
• Know your resources
• Support transition
• Plan for students with reduced
access
• Consult with a wide and
diverse group
• Compliance:
E-Rate – record keeping
CIPA, FERPA and
COPPA
Security

School
Board

Student

o
Superintendents

Super

Student

•
•
•
•
•
•
•
•
•
•

Articulate a clear vision
Develop clear, actionable policies
Know your resources
Support transition
Plan for students with reduced
access
Separate training for administrator
and teacher
Compliance: E-Rate, CIPA, FERPA
and COPPA
Share expectations and practices
with schools
Consistent, district-wide incident
response
Consider issues of data security
Incident Response Tool Flowchart
Administrator
•
•
Student

Admin

•
•

•

Develop policies and
practices
Partner with credentialed
staff
Set the standards
Consider social media
strategy, issues of access
and crisis communications
plan
Post incident response
Site Teacher and IT

•

Student

• Communication / partnership
– capacity and pedagogy
• Full visibility
• Understand and refer to policy
continuously
• Classroom management
• Set benchmarks
• Determine how to support
those who don’t have access
• Prepare post incident
response
• Compliance
• Cyber security
StStr

Teacher
& I.T
Parents
Board

Community

Super

Student
Parent

Admin
Teacher

• Policy - No surprises
BEaPRO™
• Clear expectations
• Provide support for
parents with low
access
• Crisis communication
plan
• Provide digital literacy
training
Community

Community

Student

•
•
•
•
•
•

Public relations plan
Crisis management
Identify Wi-Fi access
Law enforcement
Support services
Digital literacy training

Your Logo
Students
BEaPRO™
Balance
Ethics
Privacy

Reputation
Relationships
Online Security

Supported
Student

• “No surprise” policies
• Include student voice
• Clear expectations
about social media
• Clear expectations
specific to devices on
and off campus
• Support students with
limited access
• Post incident response
Connecting Stakeholder
School Board

Superintendent

Community

Supported
Student
Parent

Administrator

Teacher
Successful BYOD Environments
•

Vision and
understanding

School Board

•
•

Law
Enforcement
Counselors

Superintendent

•

Vision, polic
y, and
support

•

Community

PD, policy, a
nd incident
response

Supported
Student
•

Clear
expectations

Parent

Administrator

Teacher
•

Prepared and
confident
Download BYOD Whitepaper

www.iKeepSafe.org/BYOD
For More Information
Visit iKeepSafe for educators at:
www.iKeepSafe.org/educator
Access the full white papers:
www.iKeepSafe.org/BYOD
BEaPRO™:
http://www.ikeepsafe.org/be-a-pro/info/
Generation Safe™:
http://generationsafe.ikeepsafe.org/

*

More Related Content

PPTX
Connect more: Digital Culture forum - A thousand things, a thousand times
PPTX
The RAU Student digital experience tracker 2018
PPTX
Making our students ‘appy – how we successfully rolled out our student mobile...
PDF
Readying your school for BYOT
PDF
At the OU conference on Design4Learning: 'the UBER effect'
PPTX
Making your mind up: Formalising the evaluation of learning technologies 
PPTX
ALISON OER14
PDF
Rajan Gates Foundation Digital Learning Portfolio
Connect more: Digital Culture forum - A thousand things, a thousand times
The RAU Student digital experience tracker 2018
Making our students ‘appy – how we successfully rolled out our student mobile...
Readying your school for BYOT
At the OU conference on Design4Learning: 'the UBER effect'
Making your mind up: Formalising the evaluation of learning technologies 
ALISON OER14
Rajan Gates Foundation Digital Learning Portfolio

What's hot (18)

PPT
FPayanBusiness
PPTX
UAL's Strategy for Learning & Teaching and Digital Technologies
PDF
Gallaway How Discovery & Assessment Strategies Support OER Service Models
PPT
TUT's blended learning landscape
PPT
Technology enabled Medical Education
PPTX
Getting the edge: Library and Career Development Centre collaboration to help...
PDF
International Journal on Integrating Technology in Education (IJITE)
PPTX
Using oer
PDF
Lang Creating and Assessing OER Materials
PPTX
What are we designing education for?
PDF
Making the most of mobile
PPT
The library as place. Author: Peter Hickey
PPTX
Environmental Education through Enquiry and Technology: The Case of the GreeN...
PPTX
OER - Advantages and Challeges
PPTX
School library collections: Quality, digital, open
PPTX
OER presentation by sahba
PPTX
Curriculum in the cloud
PPTX
UTA New Faculty Orientation 2020
FPayanBusiness
UAL's Strategy for Learning & Teaching and Digital Technologies
Gallaway How Discovery & Assessment Strategies Support OER Service Models
TUT's blended learning landscape
Technology enabled Medical Education
Getting the edge: Library and Career Development Centre collaboration to help...
International Journal on Integrating Technology in Education (IJITE)
Using oer
Lang Creating and Assessing OER Materials
What are we designing education for?
Making the most of mobile
The library as place. Author: Peter Hickey
Environmental Education through Enquiry and Technology: The Case of the GreeN...
OER - Advantages and Challeges
School library collections: Quality, digital, open
OER presentation by sahba
Curriculum in the cloud
UTA New Faculty Orientation 2020
Ad

Viewers also liked (6)

PDF
Fssf breach-incident-table-top
PDF
Incident Response Swimlanes
PPTX
Incident Response Triage
PDF
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
PPT
Incident Management
PPT
10 Best Practices for Workflow Design
Fssf breach-incident-table-top
Incident Response Swimlanes
Incident Response Triage
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
Incident Management
10 Best Practices for Workflow Design
Ad

Similar to CETPA Presentation: Building A Successful BYOD Program (20)

PPTX
Fall CUE Presentation: Building a Successful BYOD Program
PDF
Surviving a BYOD Implementation - TxDLA 2016
PPTX
Surviving a BYOD Implementation - ISTE 2017
PPTX
Surviving a BYOD Implementation - TCEA 2016
PDF
Building a BYOD initiative
PPTX
C3 Presentation - Oct 2015
PPTX
Updated tri center 2012 csd technology
PDF
Digital Citizenship WebQuest Info
PPT
Ed Tech NJ 2013 Conference BYOD presentation
PPTX
Tri center 2012 csd technology
PPTX
Tri center 2012 csd technology
PPTX
Surviving a BYOD Implementation
PPTX
Tri Center 2012 csd technology
PPTX
Tri center 2012 csd technology
PPTX
Finalprojectedit654rev phpapp02
PDF
Surviving a BYOD Implementation - Tots Frisco 16
ODP
NJAET Fall 2013 Conference BYOD
PDF
BYOD in e-Learning - Some Considerations
DOC
Action Research EDLD 5352
PPT
Cybersmart
Fall CUE Presentation: Building a Successful BYOD Program
Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - ISTE 2017
Surviving a BYOD Implementation - TCEA 2016
Building a BYOD initiative
C3 Presentation - Oct 2015
Updated tri center 2012 csd technology
Digital Citizenship WebQuest Info
Ed Tech NJ 2013 Conference BYOD presentation
Tri center 2012 csd technology
Tri center 2012 csd technology
Surviving a BYOD Implementation
Tri Center 2012 csd technology
Tri center 2012 csd technology
Finalprojectedit654rev phpapp02
Surviving a BYOD Implementation - Tots Frisco 16
NJAET Fall 2013 Conference BYOD
BYOD in e-Learning - Some Considerations
Action Research EDLD 5352
Cybersmart

More from emilyensign (12)

PPTX
Wise Tech Choices June 27th Event
PPTX
NCE Presentation, Feb. 2015
PPTX
Education Privacy Presentation
PPTX
Education Privacy
PPTX
The 6 Pillars of Digital Citizenship Success
PPTX
NAESP Conference - July 12, 2014
PPT
Building a Positive Online Reputation
PPTX
BEaPRO Presentation: Lafayette Elementary
PPTX
Iowa Bullying Prevention
PPTX
National Conference on Youth Cyber Safety
PPTX
Take Charge of Your Digital Life
PPTX
2nd Grade Class Presentation
Wise Tech Choices June 27th Event
NCE Presentation, Feb. 2015
Education Privacy Presentation
Education Privacy
The 6 Pillars of Digital Citizenship Success
NAESP Conference - July 12, 2014
Building a Positive Online Reputation
BEaPRO Presentation: Lafayette Elementary
Iowa Bullying Prevention
National Conference on Youth Cyber Safety
Take Charge of Your Digital Life
2nd Grade Class Presentation

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Computing-Curriculum for Schools in Ghana
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Classroom Observation Tools for Teachers
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Institutional Correction lecture only . . .
PPTX
master seminar digital applications in india
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Cell Structure & Organelles in detailed.
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Cell Types and Its function , kingdom of life
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
VCE English Exam - Section C Student Revision Booklet
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
TR - Agricultural Crops Production NC III.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Microbial disease of the cardiovascular and lymphatic systems
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Computing-Curriculum for Schools in Ghana
O5-L3 Freight Transport Ops (International) V1.pdf
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Institutional Correction lecture only . . .
master seminar digital applications in india
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Supply Chain Operations Speaking Notes -ICLT Program
Cell Structure & Organelles in detailed.
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Cell Types and Its function , kingdom of life
human mycosis Human fungal infections are called human mycosis..pptx
VCE English Exam - Section C Student Revision Booklet

CETPA Presentation: Building A Successful BYOD Program

  • 1. BUILDING A SUCCESSFUL BYOD PROGRAM: A NEW PARADIGM FOR THE EDUCATION COMMUNITY www.iKeepSafe.org/BYOD *
  • 2. Agenda • About iKeepSafe • • • • BYOD Roundtable Stakeholder Responsibilities Implementation Discussion www.iKeepSafe.org/BYOD
  • 3. About iKeepSafe Dedicated to promoting the health and safety of youth online • Curriculum materials to teach Internet safety, ethics and the healthy use of technology • Generation Safe™ suite for school staff: professional development, self assessment survey and incident response tools • BEaPRO™ resources to help parents teach their children to become safe, ethical, and responsible digital citizens *
  • 4. Developing the BYOD Materials • Growing awareness of challenges around BYOD • Privacy, safety, security, access, device management, professional development, infrastructure, learning content, policies, funding, and technical support • iKeepSafe invited a variety of stakeholders and thought leaders to join a roundtable discussion *
  • 5. BYOD Roundtable • Linnette Attai, President and Founder, PlayWell, LLC • Julie Baker, Marketing Content Manager, Kaspersky Lab • Kyle Brumbaugh, Member of the Board of Directors, Computer Using Educators (CUE) • Elizabeth Calhoon, Academic Technology Specialist • Jeff Gaffney, Director of Sales-SLED, Kaspersky Lab • Camilla Gagliolo, Program Director, ISTE • Frank Gallagher, Executive Director, Cable in the Classroom • Nancy Gifford, Counsel, Wiggen & Dana LLP • Marsali Hancock, President and CEO, iKeepSafe • Mary Heston, Social Media Director, Wired Mom • Charles Leitch, Founding Principal, Patterson Buchanan Fobes & Leitch LLP • Amber Lindsay, Director of Program Development and Outreach, iKeepSafe • Sally Linford, Director of Communications, iKeepSafe • Ethan Parry, Director of Public Relations, iKeepSafe • Tim Sullivan, Publisher, Parent Teacher Organization • Glen Warren, VP of Government Relations, California School Library Association (Chair) *
  • 6. BYOD Roundtable Goals • Explore building a successful BYOD program • Consider all stakeholder challenges • Examine benefits and complexities of implementing a BYOD culture in schools • Special attention paid to issues around civil liberties, access, FERPA, CIPA and updated COPPA amendments *
  • 7. Outcomes Intended outcomes: • Develop a launch pad for administrators, policy makers, and educators to prepare students, faculty, staff and parents to thrive in this new educational environment • Assist schools with integrating a wide range of devices while minimizing risk *
  • 8. Successful BYOD Environments • • • • Access Counselors Law Enforcement Vision and clear actionable policy School Board Superintendent • Vision, policy, a nd support • Community Vision, training, and incident response Supported Student • Clear expectations Parent Administrator Teacher • Management and preparation
  • 9. School Board • Develop clear, actionable policies • Know your resources • Support transition • Plan for students with reduced access • Consult with a wide and diverse group • Compliance: E-Rate – record keeping CIPA, FERPA and COPPA Security School Board Student o
  • 10. Superintendents Super Student • • • • • • • • • • Articulate a clear vision Develop clear, actionable policies Know your resources Support transition Plan for students with reduced access Separate training for administrator and teacher Compliance: E-Rate, CIPA, FERPA and COPPA Share expectations and practices with schools Consistent, district-wide incident response Consider issues of data security
  • 12. Administrator • • Student Admin • • • Develop policies and practices Partner with credentialed staff Set the standards Consider social media strategy, issues of access and crisis communications plan Post incident response
  • 13. Site Teacher and IT • Student • Communication / partnership – capacity and pedagogy • Full visibility • Understand and refer to policy continuously • Classroom management • Set benchmarks • Determine how to support those who don’t have access • Prepare post incident response • Compliance • Cyber security StStr Teacher & I.T
  • 14. Parents Board Community Super Student Parent Admin Teacher • Policy - No surprises BEaPRO™ • Clear expectations • Provide support for parents with low access • Crisis communication plan • Provide digital literacy training
  • 15. Community Community Student • • • • • • Public relations plan Crisis management Identify Wi-Fi access Law enforcement Support services Digital literacy training Your Logo
  • 16. Students BEaPRO™ Balance Ethics Privacy Reputation Relationships Online Security Supported Student • “No surprise” policies • Include student voice • Clear expectations about social media • Clear expectations specific to devices on and off campus • Support students with limited access • Post incident response
  • 18. Successful BYOD Environments • Vision and understanding School Board • • Law Enforcement Counselors Superintendent • Vision, polic y, and support • Community PD, policy, a nd incident response Supported Student • Clear expectations Parent Administrator Teacher • Prepared and confident
  • 20. For More Information Visit iKeepSafe for educators at: www.iKeepSafe.org/educator Access the full white papers: www.iKeepSafe.org/BYOD BEaPRO™: http://www.ikeepsafe.org/be-a-pro/info/ Generation Safe™: http://generationsafe.ikeepsafe.org/ *

Editor's Notes

  • #8: Multi-faceted, matrix approach to BYOD program developmentPartnership and reliability between all levelsLaying the groundwork prior to identifying platforms and devices
  • #10: School boardsDeveloping clear, actionable policies around technology in schools ultimately resides with the boards. But developing such policies requires a robust and deep information-gathering process. Examining policies and practices of other districts is a place to begin, as is reaching out to various members of the education technology industry for input. It’s critical to know what resources your districts will need to implement any program, as well. Understanding what technology infrastructure is currently in place – how it operates and where it is challenged – can help to inform a starting point for any new plan. Hearing from teachers who have been trained on existing technology programs is also vital. Some technology can enhance learning, while other products may seem progressive, but don’t actually operate as expected in the classroom. In addition, consider what technology teachers in your area are currently using. Are you looking at a gradual plan to enhance existing resources, or do you envision replacing tools entirely? How will your decisions impact the classroom experience for teachers and students? How quickly will teachers be able to implement the plan? At the beginning of the process, consulting with a wide and diverse group is critical. Embracing the viewpoints of different stakeholders and of members of the education and technology field outside of your core communities will help in formulating a perspective on the most effective program for your schools. In addition, throughout the process of building your BYOD program policy, be mindful of E-Rate requirements. Policies on technology programs must include instructions on careful record-keeping for procurement in order to keep your schools prepared for audits. In addition, to meet CIPA requirements, Internet safety policies must be updated as technology changes. Technology polices for your districts should include information, resources, and expectations around these Federal Communications Commission (FCC) concerns.
  • #11: Superintendents have a significant role in ensuring that a technology program is embraced and optimized. The superintendent is the leader in moving any program forward, and success depends in part on understanding the school board perspective and direction. Not all school readyTransistion each school not just the first few
  • #12: Full visibility on administrator policies and expectationsTraining on devices and new classroom management techniquesSupport students who don’t own devicesReview requirements around regulationsDetermine how you will support students who don’t have access to a device or who don’t have Internet access in the home. For BYOD programs that invite multiple devices into the classroom, it will also be necessary to ensure that students are receiving equivalent education on different devices. IT Advise on existing network capabilitiesEnsure cyber security protocols and practices are in place and adequate to meet the needsIdentify requirements for expansionTrain on data security protocols
  • #13: Develop teachings around digital citizenship Define expectations around privacy and behavior:Screen-time management, ethics, privacy, reputation, relationships, securityBuild in accountability
  • #14: Develop teachings around digital citizenship Define expectations around privacy and behavior:Screen-time management, ethics, privacy, reputation, relationships, securityBuild in accountability
  • #15: Develop teachings around digital citizenship Define expectations around privacy and behavior:Screen-time management, ethics, privacy, reputation, relationships, securityBuild in accountability