-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- BYOD [x]
- Distributed Computing (60)
- Information Technology Management and Leadership (60)
- Mobile Computing (36)
- Cybersecurity (23)
- Security Management (21)
- Policy and Law (18)
- Campus Policy and Law (17)
- Campus Policies (15)
- Mobile Security (14)
- Cell Phone Policies (13)
- Consumerization of IT (13)
- Networking and Emerging Technologies (11)
- Mobile Support (10)
- Smartphones (10)
- Institutional Management (9)
- Teaching and Learning (8)
- Analytics (7)
- Mobile Policy (7)
- Support Services (7)
Use of personally owned devices continues to grow on campuses. Schools are learning how to maneuver the balance of letting the user bring their own devices to campus for work and learning and supporting these devices while educating users about the possibilities that these devices could put university networks and information at risk. If you have a BYOD policy or resource you are willing to share with our community please send it to contribute@educause.edu.
EDUCAUSE Staff Picks
BYOD ECAR Research Hub. This research report explores the implications for IT infrastructure, planning and governance, security and compliance, support strategies, teaching and learning, and budget.
Rolling Out a BYOD (Bring Your Own Device) Program, EDUCAUSE Live! June 5th and 14th.
2012 Top Ten IT Issues, EDUCAUSE Review, May/June 2012
Mobile Internet Device Security Guidelines, HEISC Information Security Guide Toolkit
Mobile Device Security, HEISC Information Security Guide
7 Things You Should Know About Mobile Security, EDUCAUSE, March 2011
Bring Your Own Device, A White House supported Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs, August 23, 2012
Library Items on this Topic
EDUCAUSE Library Items for BYOD
-
Are All Mobile Devices Equal When It Comes to Teaching and Learning? - Sponsored by Ellucian, Platinum Partner
-
February 6, 2013
|
A session at the EDUCAUSE Learning Initiative Annual Meeting
Just when you thought you had the latest and greatest mobile device, they come out with the next generation. This session will provide strategies on how to manage and maintain outdated, current, an…
-
Security Awareness and Communication in the C-Suite
-
October 4, 2012
Drawing on more than 30 years of global experience, Dave Cullinane will share challenges that CISOs face while in the C-suite. This session will focus on how to advance executive understanding …
-
Building a Flexible BYOD Program
-
August 13, 2012
To succeed at BYOD, organizations must have the flexibility to respond quickly as technologies evolve. The author discusses ways to plan for a BYOD program in EdTech Magazine. Know what…
-
Preparing for Back-to-School BYOD
-
August 8, 2012
With the BYOD trend on campus growing ever stronger, an IT network analyst shares his checklist to help ensure that your campus network is ready to manage the onslaught. …
-
AT&T Splits Phones into Work and Personal Partitions, on any Carrier
-
June 15, 2012
AT&T says it has the answer for corporations that want to let employees access work applications from personal phones without becoming a security threat. A new virtualization-style technology…
-
7 Ways BYOD Could Get You Sued
-
July 18, 2012
The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…
-
Can Big Data Help Universities Tackle Security, BYOD?
-
July 31, 2012
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data an…
-
For BYOD Best Practices, Secure Data, Not Devices
-
July 17, 2012
Author, Thor Olavsrud, writes for CIO Magazine that "IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to …
-
The Top Ten Issues in Higher Education IT
-
July 19, 2012
EDUCAUSE works with members to identify the top-ten issues in higher education IT each year. The resulting EDUCAUSE Review article is a member favorite. This year’s list is significantly di…
-
Executive Summary: Student Mobile Computing Practices -- Lessons Learned from Qatar
-
August 13, 2012
Eden Dahlstrom is a Senior Research Analyst at EDUCAUSE. Mobile computing is transforming information technology and the student learning environment in higher education. Inst…
















