Bring-your-own-device (BYOD) has emerged as a cost-effective solution, allowing organizations to adopt an mLearning approach without having to provide the devices. What are the concerns of BYOD, and how can you address them? What are the opportunities for BYOD? What are the key elements to consider when deploying mobile learning for a BYOD environment? BYOD offers employees and corporations countless business benefits, from increased efficiency to controlled costs on provisioning a mobile workforce.
This session will review the concerns and opportunities for BYOD in mobile learning. You will learn about BYOD policies, view examples, and learn about the importance of working with your IT department to ensure a successful BYOD mLearning program. You will also explore key elements to consider when deploying mobile learning for a BYOD environment. And finally, you will learn about BYOD mobile learning policies and how to implement them.
3. ENHANCES
EMPLOYEE
SATISFACTIONGives employeesa choice
WHY BYOD?
SAVES
MONEY
Can support
nearly 3X as
many devices
than
company
owned*
HELPS WITH
END USER
ADOPTIONEmployees already know
how to use the devices
*http://www.networkworld.com/article/2854044/microsoft-subnet/byod-is-saving-serious-money-for-it
5. IS IT SAFE?
BYOD brings up big
questions around safety:
1. What information is
shared?
2. Is information secure in
transit and storage?
3. Can information be
saved to the device, or
is it only accessible
through a portal?
*Ponemon Institute LLC. (March 2014). Fourth Annual benchmark Study on Patient Privacy & Data Security
6. WHO PAYS FOR WHAT?
QUESTION TO CONSIDER
Do we need to cover upgrade costs if it is required for compatibility with
certain company-approved or purchased apps?
DEVICES
Users are expected to purchase the personal devices
Provides cost savings for company
7. WHO PAYS FOR WHAT?
QUESTIONS TO CONSIDER
• Is the device essential to the employee’s job?
• What is Wi-Fi availability like?
• How much data will work-related apps use?
DATAAND
CELLULAR
PLANS
Pay staff a flat stipend
Pay a percentage of the bill
Reimburse based on actual
use
8. IF THEY USE IT, WILL YOU
SUPPORT IT?
• IT decides:
www.networkworld.com/article/2854044/microsoft-subnet/byod-is-saving-serious-money-for-it
WHICH DEVICES
• Device Type: Smartphones,
tablets, laptops, wearables,
etc.
• Brands: Apple®, Android®
etc.
WHAT HELP IS AVAILABLE
• Registering devices
• Installing apps
• Troubleshooting problems
• Etc.
9. WHAT HELP WILL YOU
PROVIDE?
• New app
installations
• Day-to-day
questions of how to
integrate to certain
systems
• Remote wiping for a
lost or stolen device
• Faulty batteries or
broken screens
10. HOW WILL YOU PROVIDE THE
SUPPORT?
How will IT staff be reached?
How many employees will be needed?
Will FAQ documents
help?
11. BYOD POLICIES
How devices
are used
What systems they need access to
Potential risks
Get input from device users to better understand:
12. BYOD POLICIES
Should address:
EXPENSE ALLOCATIONS
(Who pays for what?)
IT SUPPORT
(If they use it, will you support it?)
ACCESS
(What is effective and acceptable to use?)
SECURITY
(Is it safe?)
13. Policy
13
Which types of the organization’s
resources may be accessed via
mobile devices?
Which types of mobile devices are
permitted to access the organization’s
resources?
14. MOBILE DEVICE MANAGEMENT
(MDM) SOLUTIONS
• Can help keep track of all approved BYOD
devices
• Control access to enterprise networks
and systems
• Manage app installations and upgrades
• Offer enhanced security
• TIP: Give employees a heads-up of what organization
will be able to access once MDM is installed
15. 15
Ensure your IT folks are in the
loop with your mobile learning
interventions.
There may be many back-end
needs that are out of your hands.
It’s also nice to have a contact
when you’re in a pinch!
Megan McKee
16.
17. • Give employees
access to all the
necessary data,
but also see to it
that this data
cannot be stored
anywhere on the
device.
User’s Limit of Accessing Information
17
23. 1. CREATE a mobile device security policy.
2. SPREAD the word across your organization.
3. TRAIN your people in best practice.
4. IMPOSE security settings on the workforce.
5. ENSURE enforceable mandatory access to all devices.
6. SET standards for central, controlled synchronization
7. DECIDE whether your employees are able to ‘Bring Your Own
Device’.
8. CONSIDER automatic and user-transparent encryption on all
data on every mobile device and removable medium.
9. TRACK and label every device – and take a regular inventory.
10. DEPLOY mobile anti-virus solutions.
Ten tips for mobile peace of
mind
23
30. Summary
• Use mobile as a platform for delivering
short form and on demand learning, as
well as supporting the formal learning
process.
• BYOD is the perfect option for mobile
learning, enabling more freedom and
flexibility to users to learn at the point of
need, not just when they are told to.
31. Resources
• http://www.cantechletter.com/2015/01/bring-device-next-big-
trend-education/
• The Ten Commandments of Bring Your Own Device (BYOD)
• http://www.ciscoservicesdynamics.com/byod
• http://www.networkworld.com/article/2854044/microsoft-
subnet/byod-is-saving-serious-money-for-it.html
• https://www.gaggle.net/speaks/5-tips-administrators-can-lead-
successful-byod-implementation/
• http://www.learningsolutionsmag.com/articles/1396/top-six-
byod-considerations-adopting-an-open-screen-door-policy
• http://www.techradar.com/news/computing/what-is-byod-and-
why-is-it-important--1175088
• https://www.pulselearning.com/blog/mobile-learning-for-the-
byod-era/
• http://www.zdnet.com/article/how-to-make-byod-work/
There was a time when organizations or companies provided all the resources for employees to get their job done. From the basic infrastructure to training and persistent development of every individual, everything was the exclusive responsibility of the organization.
That era of corporate responsibility has changed with the development of smartphones and devices; enter Bring Your Own Device (BYOD).
We are now living in the era of BYOD, an age where employees are enhancing their knowledge, developing new skills, and finding resolutions on their own. Organizations that can support this era are optimizing on their employees’ own devices.
Offering employees a larger infrastructure, resources, and financial support helps advance their knowledge and consistently evolve them as professionals.
By encouraging BYOD leaners and deploying courseware suitable to mobile devices, organizations can eliminate setup or training times associated with company-owned devices.
By removing the training need to operate an unfamiliar device, BYOD learners can immediately access and focus their attention on specific training requirements.
A BYOD mobile learning policy also gives employees access to performance support materials, wikis, or instructional videos around the clock.
Having access to this information anytime, anywhere provides employees with additional flexibility and allows them to choose a time that is most convenient for them to complete training.
BYOD can deliver tangible benefits, as proven by Cisco’s own IT results. Cisco now has more than 53,000 personal and corporate smart devices and has seen a 96 percent increase in smart devices over the last 2 years. Yet mobility costs have reduced by over 30 percent.
Cisco estimates that the annual benefits from BYOD range from $300 to $1300 per employee, depending upon the employee's job role, and that Cisco employees pay an average of $600 out of pocket for a smart device that will give them more control over their work experience.
A mobile device security policy should define which types of the organization’s resources may be accessed via mobile devices, which types of mobile devices are permitted to access the organization’s resources, the degree of access that various classes of mobile devices may have—for example, organization-issued devices versus personally-owned (bring your own device) devices—and how provisioning should be handled.
It should also cover how the organization's centralized mobile device management servers are administered, how policies in those servers are updated, and all other requirements for mobile device management technologies. The mobile device security policy should be documented in the system security plan. To the extent feasible and appropriate, the mobile device security policy should be consistent with and complement security policy for non-mobile systems.
The company has to next set a limit to the user’s right of accessing and storing corporate information received via his or her mobile device. This limit largely depends upon the type of the organization and the nature of information the establishment gives its employees access to.
The best practice for companies would be to give employees access to all the necessary data, but also see to it that this data cannot be stored anywhere on the device. This means that the personal mobile device merely becomes a type of viewing platform – one that does not support exchange of information.
You’re going to need a consistent approach to the way you organize, deliver, and manage your learning content. Be mindful of creating a learning experience that matches or thematically mirrors your traditional online learning experiences, which likely also need updating.
Assuming learners can just access your standard learning portal via their device’s web browser is likely a poor judgment call when considering what the mobile experience should be.
Next, it’s imperative you determine and document a well-defined list of mobile devices your team intends to permit—devices you’ll allow through your screen door rather than allowing use of anything and everything. Realize that your list may be more concise than the devices IT plans to support under their BYOD policies for tasks like accessing corporate email or intranets. You should consider supporting what I’d term “tier one” devices, which include most of the “top- and middle-shelf” offerings being sold by wireless carriers around the globe. As stated before, real challenges come from older devices with restricted screen sizes and incapable web browsers. Legacy devices also tend to offer poor security features and slower connection speeds, and can force content degradation due to limited support for HTML5.
Learning on a mobile device is a different experience compared with more traditional instructor-delivered classes and online-delivered courses. Mobile devices are great for short, “bursty” learning activities but also a good way to mix formal learning activities with informal social interactions.
Mobile provides easier opportunities to promote the creation and collection of user-generated content (e.g., taking photos, capturing videos, or recording podcasts) that can turn content consumers into content creators.
Mobile devices also use competing media formats, storage mechanisms, and encryption methods, which all introduce challenges in a BYOD environment unless properly organized and managed.
All previous considerations flow nicely through the screen of our sixth and final consideration—tighter connections between mobile workers and your backend systems of record; e.g., your learning management system (LMS), talent management system (TMS), and human resource information system (HRIS). Mobile workers outfitted via their own devices want assurances that their efforts to learn and grow will count where it matters most—in the training records and histories managed by T&D. Nothing can divert interest faster than the realization that a mobile learner is unable to use his or her device of choice to complete the required or selected training.
Best practice
Make sure all mobile learning apps directly connect with your LMS/TMS platforms and ensure connections are possible between your learners and the various document stores, media servers, and internal social networks your teams use to leverage organizational preparedness.
three key elements to consider when deploying mobile learning for a BYOD environment
1. Include Necessary content onlyWhen converting eLearning courseware for mobile learning, you need to consider what content is absolutely necessary. Images and unnecessary content will take up valuable space and need to be removed for mobile deployment. Remember that the display screen on mobile devices and tablets is a lot smaller than on a laptop or PC. Avoid including images, graphics, and charts for aesthetic appeal; only include images and content blocks that are deemed important and necessary to the content.
2. Break the course content into bite-size chunks.Your BYOD learners want to access training content quickly and conveniently. Content needs to be broken into bite-sized chunks so it can be easily accessed and absorbed. Keep content blocks short and summarize text using bullets and simple forms.
3. Be careful when integrating audio elements.Your BYOD learners will be accessing mobile learning courseware in a variety of different environments, which needs to be considered when adding video and audio elements to content. Adding subtitles to video and audio elements is a simple way to overcome difficult environments, allowing your learners to turn off audio as required.
CREATE a mobile device security policy.
SPREAD the word across your organization. Make sure everyone knows the security implications of mobile working, and the importance of following the protocol.
TRAIN your people in best practice. Focus on real life situations and make sure everyone knows what they can and can’t do with company data, how to access it securely, and how to recognize and deal with suspicious activity.
IMPOSE security settings on the workforce. Do not rely on users setting their own security: even with the best intentions, they can get it wrong.
ENSURE enforceable mandatory access to all devices, so your IT team can always act if a device is compromised. Ensure users are not able to override your access rights.
SET standards for central, controlled synchronization, so important data is backed up automatically and only approved applications are used. This is difficult to control with smartphones, especially BYOD devices.
DECIDE whether your employees are able to ‘Bring Your Own Device’. Though issuing company equipment offers maximum control, a ‘BYOD’ policy is cheaper to implement. And with careful management, it is an increasingly attractive option for company and employee alike.
CONSIDER automatic and user-transparent encryption on all data on every mobile device and removable medium. Think of every separate piece of equipment as a self-contained unit that could hold sensitive data, and protect it accordingly.
TRACK and label every device – and take a regular inventory.
DEPLOY mobile anti-virus solutions – and ensure they are compatible with the other solutions you use, so infected devices cannot harm your network.
The White House has a rather complete BYOD toolkit online that was developed in support of federal agencies implementing a BYOD program.
Highlights of the toolkit include case studies and example policies. Templates can be a better starting point because they come from the enterprise, not some pundit or analyst's desk.
SHRM has sample policy template
IT Manager Daily published this basic template by Megan Berry. She does a good job of breaking down and explaining the critical parts of a BYOD policy.
Tech Pro Research's BYOD policy includes a pre-written policy designed to allow you to copy the text from the zipped PDF into your favorite word processor and customize it to fit your organization's BYOD policy needs.
Use mobile as a platform for delivering short form and on demand learning, as well as supporting the formal learning process.
This is what makes BYOD the perfect option for mobile learning, enabling more freedom and flexibility to users to learn at the point of need, not just when they are told to.