180 likes | 301 Views
Rider University’s BYOD Story. First two short films……. Dilbert Humorous skit about an employee, desperate to get his work done more efficiently tries to smuggle his own laptop and smart phone into his workplace … Consumerization of IT
E N D
First two short films…… Dilbert Humorous skit about an employee, desperate to get his work done more efficiently tries to smuggle his own laptop and smart phone into his workplace… Consumerization of IT Things are changing, and consumerization is blurring the lines between work and life by giving folks more influence and choice over how and where they work…..
About Rider • Lawrenceville Campus • 3,750 undergraduates • 88% of freshman live on campus • College of Liberal Arts, Education and Sciences • College of Business Administration • School of Fine and Performing Arts • College of Continuing Studies • Princeton Campus • 350 Undergraduates • Westminster Choir College
About Rider • Total Number of Employees • Total Number of employees at Rider 1,302 • Full Time = 749 • Part Time = 553 • Faculty/Staff Breakdown • Faculty = 578 • Staff = 724
BYOD Program Drivers • University Strategic Plan • University Culture • Technology Trends • Cost and Support Savings
BYOD Program Goals • Encourage innovation • Create an option for people to “have it their way” • Address management of constant change and consumerization of IT head-on • Increase employee accountability and awareness for information privacy and security • Control costs
Rider’s BYOD Story • Growing demand to support more and more unique devices in the enterprise • The mobile landscape seemed to be changing around us every week • Not enough staff resources to keep up with support demands. • Needed to update our mobile policy anyway to meet new regulatory guidelines
How Does Rider’s IT Staffing Match up with Comparable Universities? Relative IT FTE Staffing Levels Average 84.6 Median 77.1 = Average = Range = Median = Middle Quartiles = Rider U
Rider’s BYOD Solution • Foundation • Policy and Guidelines • Process • Technology
Mobile Device Procurement/Support & Usage Policy Guidelines for the use of Mobile Devices Information and Password Security Guidelines Computer Use Policy Policy and Guidelines
Mobile Device Procurement, Support , and Usage Policy 2 Options: University assigned or BYOD • Applies to phones and tablets (for now) • Both require substantial business need and division head (or dean) approval • Funded from business unit operating funds
Mobile Device Procurement, Support , and Usage Policy 2 Support Levels Full Support : University Assigned • IT selects and issues device annually • standard device, standard setup Concierge Level Support: BYOD • Use personally owned device • Individual fully responsible for maintenance and security • IT provides settings for access to email, wireless only
Mobile Device Procurement, Support , and Usage Policy Summary of Charges • Allowances and charges reviewed annually • Cellphones and Smartphones • University issued or non-taxable allowance for BYOD. • $75 per month for voice/text, $135 per month voice/text/data • Tablets • University issued($500 per year charge) or BYOD. Note: Both require registration in a mobile device management service for remote wipe in the event device is lost or stolen.
Guidelines for the Use of Mobile Devices • Applies to smartphones ,tablets, and USB drives • Applies to university and any personally owned devices used for university business • Guidelines based on industry standards • Label the device with name and phone • Passcode required to unlock device • Set an idle timeout to lock the device • Keep all software and operating system up to date • Required enrollment in university mobile device management service in the event the device is lost or stolen • If capable, enable encryption • Do not jailbreak or “root” the device
Information and Password Security Guidelines • Rider University possesses information that is sensitive and valuable, • Some information is protected by federal and state laws. • Diligent protection of University information is critical. • Follow the mobile guidelines carefully • Know how your device works! • Always choose strong passwords • Don’t share it • Don’t save it online • Don’t write it down
Lessons Learned So Far • BYOD option very popular • About 50% of individuals assigned a university phone took the BYOD option right away. • No data on tablets yet. • Increased staff moral and productivity. • Employees like the freedom of choice • Employees seem more available • OIT support burden reduced significantly. • Increased information privacy/security awareness. • Emphasis on security guidelines and accountability for BYOD making a difference across the board.
Next steps • Establish Mobile Device Information Privacy and Security Guidelines • Create training program /videos • Audit devices in BYOD program to measure compliance with guidelines • Assess program satisfaction
Questions? For more information including Policy’s, forms, and guidelines please visit http://www.rider.edu/technology