Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

BYOD

No description
by

Jeff Klevorn

on 8 April 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of BYOD

Business ideas for the classroom BYOD Risks and Rewards How to secure BYOD Walk around and see what they are looking at
Anti virus protection
Internet security link
Sign waiver What does BYOD mean for Education Uses of What does BYOD mean for Security Who owns device?
Who manages the device?
Who secures the device? Setting Policy and Compliance for BYOD 7 steps to a BYOD security plan Identify the risk elements
Form a committee and understand the risks
Decide how to enforce policies
Build a project plan
Evaluate solutions
Implement solutions
Periodically reassess solutions Type of devices
Limits
Future uses Questions: Help students: Data plan's hotspots
Tethered options
Wifi data plans Questions to answer Web
Wireless
Mobile devices get answers faster
research
take notes
projects Reference Eschelbeck, G., & Schwartzberg, D. (2012, June). BYOD Risks and Rewards. Retrieved April 7, 2013, from SOPHOS: http://www.sophos.com/en-us/security-news-trends/security-trends/byod-risks-rewards.aspx
Full transcript