-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- BYOD [x]
- Distributed Computing (60)
- Information Technology Management and Leadership (60)
- Mobile Computing (36)
- Cybersecurity (23)
- Security Management (21)
- Policy and Law (18)
- Campus Policy and Law (17)
- Campus Policies (15)
- Mobile Security (14)
- Cell Phone Policies (13)
- Consumerization of IT (13)
- Networking and Emerging Technologies (11)
- Mobile Support (10)
- Smartphones (10)
- Institutional Management (9)
- Teaching and Learning (8)
- Analytics (7)
- Mobile Policy (7)
- Support Services (7)
Use of personally owned devices continues to grow on campuses. Schools are learning how to maneuver the balance of letting the user bring their own devices to campus for work and learning and supporting these devices while educating users about the possibilities that these devices could put university networks and information at risk. If you have a BYOD policy or resource you are willing to share with our community please send it to contribute@educause.edu.
EDUCAUSE Staff Picks
BYOD ECAR Research Hub. This research report explores the implications for IT infrastructure, planning and governance, security and compliance, support strategies, teaching and learning, and budget.
Rolling Out a BYOD (Bring Your Own Device) Program, EDUCAUSE Live! June 5th and 14th.
2012 Top Ten IT Issues, EDUCAUSE Review, May/June 2012
Mobile Internet Device Security Guidelines, HEISC Information Security Guide Toolkit
Mobile Device Security, HEISC Information Security Guide
7 Things You Should Know About Mobile Security, EDUCAUSE, March 2011
Bring Your Own Device, A White House supported Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs, August 23, 2012
Library Items on this Topic
EDUCAUSE Library Items for BYOD
-
Podcast: Tim Bounds on ITS and Student Affairs at Duke University
-
May 24, 2012
In this podcast, Ethan Benatan , vice president for information technology & CIO at Marylhurst University, interviews Tim Bounds , Student Affairs Information Technology Services a…
-
Hot Topics and Emerging Issues: Cybersecurity in 2012 Note re audio: The Adobe Connect recording has audio for the first 8 minutes; go to the wav file under the Resources Tab for the remaining audio recording.
-
May 16, 2012
A four-person panel from diverse institutions will discuss the new and important security topics of the year including BYOD, blackhole DNS, research-computing security, cloud security, IPv6, and s…
-
BYOD (Bring Your Own Device) - Sponsored by Symplified
-
May 16, 2012
The mobile revolution is upon us. Tablets and smartphones are quickly becoming the productivity tools of choice for students, faculty, and staff to conduct day-to-day tasks with greater ease and ef…
-
Does BYOD Require BYOITS (By Your Own IT Staff) for the Mobile Tsunami?
-
June 1, 2012
|
A session at the Southeast Regional Conference
We are in the midst of a national trend of BYOD (Bring Your Own Device). How does this new movement impact our campuses in terms of IT support for teaching and learning? Will those schools implemen…
-
Field Research: Mobility in the Age of Consumerization
-
February 17, 2012
This 31-page report analyzes the results of a recent Gartner research study performed between August and October of 2011. The study focused on enterprise mobility and was designed to generate qu…
-
Lions and Tigers and Mobile Devices: Removing the Fear Factor from Securing Smart Devices
-
May 17, 2012
|
A session at the Security Professionals Conference 2012
The dramatic increase of smart devices across campus has presented security professionals with some interesting opportunities and challenges. Two Texas state institutions will review where they are…
-
Spotlight on Mobile Computing: Enterprise Mobile Technology Services Best Practices
-
June 21, 2011
The world of enterprise mobile technology services feels a lot like the Wild Wild West. What services should we consider providing? How should we provide these services? Some institution…
-
Going Mobile with a Web-Based Strategy
-
March 29, 2011
Key Takeaways If your campus needs to go mobile immediately , how should you assess , choose , and adopt the best mobile strategic approach for your campus community? …
-
7 Things You Should Know About Mobile Security
-
March 17, 2011
Very small computing devices represent a new frontier in the computer security war. Mobile devices amplify existing security concerns while introducing a new set of risks, but most people have …
-
Securing Mobile Devices - Seminar
-
April 4, 2011
|
A session at the Security Professionals Conference 2011
The iPhone, BlackBerry, Droid, and more—mobile Internet devices are extremely popular, including with faculty members, staff, and students. But are these devices secure? Do we have any idea who…

















