Naomi, thank you for all of your work on this. I truly believe this is where we are headed, albeit, slowly. How many of the districts that you work with presently have a BYOD policy in place? What seems to be the biggest obstacle to implementation for those who have not yet adopted a BYOD policy?
I am working with over 58 districts that have gone 1:1 in at least a 5-8 grade level or a 9-12. Most have some form of policy in place and others are rapidly writing one as we speak. I think- why create the wheel- learn from others- tweak an example- and give credit where credit is due. It just feels good to share these resources as a lot of time and effort went into them, and someone has to reap the rewards:-)'
We have been studying BYOD in NC as well. The concerns that have been identified include: policy, device standards, wireless infrastructure, security, and maintenance. This would mean a review of Acceptable Use Policies, Security model and risks associated with BYOD. The attached document shares how one district in NC is approaching BYOD.
BYOD.doc 28.5 K
Rapides Parish has implemented a BYOT policy. From what I have heard, mainly the high schools have requested a guest network for the devices. I do know that a few of the elementary schools are seeing more and more Kindle devices coming into the classroom.
I am attaching our BYOT policy.
BYOT Guidelines Final.pdf 78.5 K
Most have stuck with it, but some may have revamped policy along the way on a per need basis. Here is another great 1:1 policy that was shared with me today from Patrick Larkin as an epub file so you can store it on your iPad in your iBook shelf. http://www.patrickmlarkin.com/2012/01/download-our-bhs-11-overview-an-e-pub.html Here is also the latest Scoop.it curated results for 1:1 policy on BYOD http://www.scoop.it/t/1-1-and-byod or http://www.scoop.it/t/byod
Hope all is well!
I asked my instructional technology contact what our school district's BYOD policy is and here is his response:
It WAS: students can't
It IS or soon WILL BE: students can with the understanding by parents and students that the schools/district are not responsible for loss or damage
I have not seen anything official and I don't know if teachers will be able to set their own limits.
Need help and assistance from this online thread. I was in a nearby school district today that is looking for more BYOD information to support their deployment of a BYOD pilot program. She and others presented the possibilities and their plan of action for a HS pilot- but were cut short last night at their school board meeting. Please see the following request to see if you can assist a very good friend and a local "technology poor" school district to move forward with a positive light on the BYOD implementation and assist with finding support articles in favor of student academic achievement with BYOD.
Thank you all in advance for your efforts!!!!!
This is the exact written statment she posted out to our WI tech lisstserv-------
We are on a continuing “saga” (grin…) trying to get our BYOT Pilot Project underway at our the high school in a controlled, limited environment. We have developed what we feel are very well-founded BYOT expectations for students and staff which were presented at last night’s board meeting.
I am in need of finding out if any district that completed a BYOT pilot project is willing to share their assessment surveys or specific information on how you determined the final recommendations. Ex. Did your pilot fail or succeed? Why? What was the criteria for success or failure?
If anyone has pre-post assessments or surveys (parent, student, educators) relating to BYOT or have tracked/logged impact on student learning (even anecdotal) please consider sharing your survey/assessments of your BYOT pilot.
I am of the mindset, like you, that technology is a tool. Trying to correlate direct impact on student achievement is one challenge that even the best researchers in the education world have a very difficult time proving. Nonetheless, our board is seeking justification for BYOT beyond the students are more engaged, more productive, etc.
Thanks in advance!
Jan Wee, Director- I & T Services
School District of Holmen
@weejan on Twitter
Here is the collection of responses I received from my Twitter PLN about finding and documenting student learning evidence from BYOD/T/L programs.
Here are a few articles that you may find interesting and assist your BYOD efforts.
District leader contributions of articles and resources
BYOD as the Catalyst to Transform Classroom: http://www.districtadministration.com/article/byod-catalyst-transform-classroom
“Research-based benefits of one-to-one mobile learning initiatives might include:  Improvements in attendance and discipline,  Broader array of learning resources and experiences,  Increased frequency and quality of supportive individual and group interactions,  Improvements in student and parent attitudes toward the school, and  Increases in student achievement.” http://www.eschoolnews.com/2011/04/29/bring-your-own-device-catching-on-in-schools/2/?
Speakup Survey Results: http://www.tomorrow.org/speakup/pdfs/SU10_3EofEducation%28Students%29.pdf
Schools Plug into BYOD http://www.cisco.com/web/strategy/docs/education/ciscoedukatysdcs.pdf
Classroom Management Models: https://www.evernote.com/pub/mguhlin/byod#n=e44446c7-cdff-4232-b6fe-e7eb8b01603a
MN 6 Steps for Increasing Student Access with BYOD
One of the best finds was connecting with Cary Harrod from Ohio. She shared a Google Doc of BYOD resources and her case study results which are attached.
BYOL Game Changer Resources
BYOD whitepaperfinal-1.docx 204.1 K
Here is a collection of iPad 1:1 rollouts or as BYOL for k12 pilot projects.
I am so excited to share with you that Cary Harrod will be our virtual quest presenter during our tech leadership meeting in WI today. She will come to us through Adobe Connect. I will share updates of her shared expertise from our meeting on BYOD, 1:1 and Personalized Learning.
In the mean time here is her dynamic blog, webpage and twitter digital footprint.
Partnership for Powerful Learning: http://fhsdppl.wetpaint.com/
I just found a really great intel resource on avoiding malware on apps for phones- I thought a lot of the content is relevant to this discussion.
Ways you can reduce the chances of downloading a malicious application:
- Only use reputable applications, such as those offered at the Intel App Store, MobileIron* and Handheld Services sites.
- Go directly to the desired vendor's website for your applications and allow it to redirect you to the proper location instead of clicking on a link from an unknown site.
- Only install applications that you actually use, from sites you trust. Avoid tapping on advertisements.
- Analyze reviews from others prior to installing an application. Look for consistent feedback and any indications of problems.
- Use caution before downloading free applications. Most malware utilizes free applications.
- Check the service agreement (the one that you accept when you download the application). Look for any information regarding handling of your data.
- Make sure you know what information the app is trying to access. For example: When you install an app it will ask your permission for access. If an app asks for something that doesn't sound necessary, such as Internet access for a calculator or Solitaire game, don't just click "OK". It might be loading ads or communicating with a hostile site about your phone's data.
- Pay attention to software updates. Malware authors could produce a harmless version of a game or utility program for a while to gain reputation and a user base, then introduce malicious code in an updated release. It may also be possible for apps to download new code on their own.
- Always have a backup available for your personal data (there are many cloud service providers who offer this). There is no need to back up Intel data. Intel already backs that up for you.
- Use security software. It may sound strange, having to install anti-virus or anti-spyware software on a phone. But if hackers can get in, who knows what could end up in your device?
- Take precautions opening e-mails on your mobile device, just as you would when using an actual computer.
- Limit use of Bluetooth*. Bluetooth capabilities on today's smartphones may make it easy to talk hands-free, but they're also a target for hackers, who can take advantage of its default always-on, always-discoverable settings to launch attacks.
- Require authentication. In other words, use your device's password function.
- Turn on encryption. It sounds obvious, and it's a recommended policy when it comes to laptops or external drives. But many people don't consider it for their phones.
For more information
How to tell if you have a malicious application on your device:
- Keep an eye on the text messages your phone has sent.
- Watch your phone logs for anything unusual.
- Check your bill for unknown numbers.
- Monitor the battery. If the battery life deteriorates unusually fast it could be an indication of malware.
- Realize that even after these other precautions, there's still a chance you won't be able to detect a malicious app.
If you discover a malicious application on your device:
- Immediately turn off the device.
- Remove the SIM card.
- Move out of range of Wi-Fi.
- Switch the device on.
- Remove the application.
- Monitor your device for anything unusual. If you still appear to be infected, the safest thing to do is wipe the device and restore from a previous backup.
Paige this is an excellent resource- wish I had this about one week ago. I was sending our replies on my cell phone through email and a text message- and when my message was sent- it would randomly choose past emails or text messages I sent. This was irritating and recipients got back to me and questioned why I was sending out 6 month old responses from others. This also could have put me in a jam- but thankfully the email/text messages sent out were all educationally related and appropriate- just not to the right recipient. I then proceeded to install the app of AVG virus software for my Droid phone and it caught the culprit immediatly. It was an effected Sears text message that I received, read and though delteted and it red flagged it immediately.
I also reformatted my phone and started from scratch/original settings and now it runs so much better. I so appreciate the tips and tricks you have just shared with all of us!!!!
- Only use reputable applications, such as those offered at the Intel App Store, MobileIron* and Handheld Services sites.
I am excited to share with all of you that the marvelous Cary Harrod from the Cincinnati, OH shared here latest findings of their BYOD rollout and whitepaper. I am inserting the 30 minute Adobe Connect webinar link for your review. Cary shares some amazing strategies, a few setbacks they encountered but all her accomplishments of this BYOD rollout. This is a prime learning example that everyone shaould watch and learn form! You can follow Cary on Twitter at @charrod or her blog at Amplifying the Learning http://amplifyingthelearning.blogspot.com/
Also, Check out this article: http://thejournal.com/Articles/2010/08/05/Bring-Your-Own-Technology.aspx?Page=1 We're excited and gearing up. Let's continue to share...this just might be the way many districts go about increasing access to the tools!Carry Harrod's Presentation: Implementing a Carefully Planned BYODHere is also Cary's documented whitepaper on their BYOD: http://one-to-oneinstitute.org/docs/Harrods%20-White%20Paper%20Forest%20Hills.pdf?utm_source=February+2012-Newsletter&utm_campaign=Feb+Newsletter&utm_medium=archive
We are hosting a one day conference on BYOD: Policy, Network, Management and Support on November 15, 2012 and would be thrilled to have some participants join us through video conference and live streaming. If you are interested, please register at ecampus.esc13.net for FA1224881 in the catalog. You will be able to join in, make comments and ask questions. Questions now? Send to email@example.com
Thank you for this article and for the resources provided! Thanks, too, to those responding with additional information about what is happening in their own divisions along with links to additional resources.
Rockingham County Public Schools in Virginia has a BYOD policy implemented last year in our middle and high schools. Here is our policy for "Use of Student-Owned Electronic Devices" (JZK Policy):
I created a video at the end of last year featuring students and teachers utilizing this policy in the classroom:
Instructional Technology Resource Teacher
Rockingham County Public Schools