{"id":35,"date":"2016-02-26T20:14:29","date_gmt":"2016-02-27T03:14:29","guid":{"rendered":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/?page_id=35"},"modified":"2016-03-27T16:22:21","modified_gmt":"2016-03-27T23:22:21","slug":"essesntial-policy-elements","status":"publish","type":"page","link":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/2-byod-policy\/essesntial-policy-elements\/","title":{"rendered":"Policy Framework"},"content":{"rendered":"<div class=\"page\" title=\"Page 14\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">We need to have a clear BYOD policy defining what is, and what is not, acceptable on a school\u2019s network. We must clarify expected behavior and set consequences for non-compliance. All\u00a0<\/span><span style=\"color: #000000;\">stakeholders, including students, must have ownership of these rules and consequences so that they are able to adhere to the policy over\u00a0the long run. Moreover, teaching and learning policy must include BYOD policy and its effective use in teaching and learning. An inclusive policy developed by a BYOD team that involves all stakeholders may help achieve all of these objectives. Possible roles of the <strong>BYOD team members\u00a0<\/strong>are\u00a0explained below<strong>.<\/strong><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-924\" title=\"Adapted from-http:\/\/www.k12blueprint.com\/sites\/default\/files\/BYOD-Planning-Implementation.pdf\" src=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Slide1-2-300x225.jpg\" alt=\"\" width=\"416\" height=\"312\" srcset=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Slide1-2-300x225.jpg 300w, https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Slide1-2.jpg 720w\" sizes=\"auto, (max-width: 416px) 100vw, 416px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">The <strong>Core Team, \u00a0<\/strong>may include instructional designers\u00a0and technology specialists who support the district while planning the policy document, exploring current technologies, calculating the feasibility of available technology, troubleshooting, and teacher training.<\/span><\/p>\n<div class=\"page\" title=\"Page 2\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>Administration and board members<\/strong> will\u00a0support\u00a0the core team and help teachers<strong>\u00a0<\/strong>\u00a0test suggested technologies, plan, run, and attend professional development. Teachers may be provided an extra stipend if additional planning or workload is required.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-987\" title=\"Adapted from: https:\/\/www.kiddit.com\" src=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Slide1-3-300x225.jpg\" alt=\"\" width=\"408\" height=\"306\" srcset=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Slide1-3-300x225.jpg 300w, https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Slide1-3.jpg 720w\" sizes=\"auto, (max-width: 408px) 100vw, 408px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">A dedicated group of<strong>\u00a0focused students <\/strong>may<strong>\u00a0<\/strong>participate during\u00a0the planning phase. Being digital natives and future consumers of BYOD programs, their responsibilities include learning and testing new educational technologies and providing feedback to the teachers, administrators and core team in order to troubleshoot\u00a0<\/span><span style=\"color: #000000;\">problems, if any. Students\u00a0may help teachers design classroom management rules as well to promote student ownership over the BYOD policy. Students involved in the planning program may be given\u00a0additional school credit upon successful completion of the course.<\/span><\/p>\n<div class=\"page\" style=\"text-align: justify;\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><span style=\"color: #000000;\"><strong>Parents<\/strong> can provide\u00a0input that may\u00a0weigh heavily on the program design as they make major decisions for their children under the age of 18.<\/span><\/p>\n<p><span style=\"color: #000000;\">A BYOD team could involve input from <strong>community or local business owners<\/strong> as well, especially if the district is seeking community funding. Moreover, business trends will help the BYOD team to decide which skills need to be taught to the future employee (student) to be successful after 5-10 years.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Hardware and software infrastructure of BYOD Policy:<\/strong> The<strong>\u00a0<\/strong>BYOD team will decide the hardware\u00a0and software structure for BYOD by contacting local vendors and network specialists. Hardware structure includes the selection of a wireless infrastructure, a network that is able to handle large numbers of devices at an appropriate speed if all students log on at the same time, is cost-effective, and has enough bandwidth for multimedia. Data security, protection from viruses and malware, inappropriate use of internet (filtered connections) are also some of the most important considerations to make while forming a policy. Requiring\u00a0three different types of authentication may help, for example in a segmented network, teachers, students, and guests will have different networks to avoid security conflicts. When it comes to purchasing mobile devices, parents and students\u00a0should\u00a0have a general set of recommendations and considerations so that it does not become an issue of haves and have-nots.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1006\" title=\"Image Credit: http:\/\/specialed.about.com\/od\/Managing-relationships\/\" src=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Slide1-4-300x225.jpg\" alt=\"\" width=\"400\" height=\"300\" srcset=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Slide1-4-300x225.jpg 300w, https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Slide1-4.jpg 720w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>Acceptable use of policy:<\/strong> The\u00a0BYOD team will develop many documents for parents and students to communicate the acceptable use of policy, digital citizenship curriculum, parents letters, research based classroom management rules that are flexible and can be modified by the classroom teachers based on their own needs, and professional development sessions to train teachers so that they can put pedagogy first and promote 21st century skills while using BYOD in their classroom.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>Tech team: <\/strong>Schools will need a tech team to address all IT\/hardware\/software issues on a daily basis. This service should be provided 24\/7.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>Other resources: <\/strong>An online library is also advantageous if a school is going to utilize\u00a0BYOD. Moreover, there should be additional BYOD devices available in school for all those students who cannot afford their own device.\u00a0This service should be available 24\/7. These devices can be issued on a daily, weekly\/monthly basis with proper login\/logout information. Students can become each other&#8217;s resources by sharing their devices with each other, making the best use of different devices.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>Ongoing Professional Development: <\/strong>As BYOD technology is changing rapidly, teachers need to be trained at the same pace. Thus, the BYOD team will\u00a0analyze the market and plan the\u00a0professional development sessions accordingly.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><iframe loading=\"lazy\" style=\"padding: 0; margin: 0; border: none;\" src=\"\/\/padlet.com\/embed\/o7mpgp29g943\" width=\"100%\" height=\"480px\" frameborder=\"0\"><\/iframe><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"border-top-width: 2px; border-top-style: solid; border-top-color: #a7d23a; padding: 8px; margin: 0px; font-size: 12px; text-align: justify;\"><span style=\"color: #000000;\"><a style=\"color: #000000; text-decoration: none;\" href=\"http:\/\/padlet.com\">Created with Padlet<img decoding=\"async\" style=\"margin: 0 0 0 10px; padding: 0; border: none; width: 16px; height: 16px;\" src=\"http:\/\/padlet.com\/favicon.ico\" alt=\"\" \/><\/a><\/span><\/div>\n<div style=\"border-top-width: 2px; border-top-style: solid; border-top-color: #a7d23a; padding: 8px; margin: 0px; font-size: 12px; text-align: justify;\"><span style=\"color: #000000;\"><a href=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/2-byod-policy\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-1263\" src=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Picture101.png\" alt=\"Picture101\" width=\"150\" height=\"113\" srcset=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Picture101.png 354w, https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/02\/Picture101-300x225.png 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><a style=\"color: #000000;\" href=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/2-byod-policy\/4-assessment-of-byod-policy\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1205\" src=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/03\/Picture49.png\" alt=\"Picture49\" width=\"150\" height=\"109\" srcset=\"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/03\/Picture49.png 366w, https:\/\/blogs.ubc.ca\/etec533byodtutorial\/files\/2016\/03\/Picture49-300x218.png 300w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>We need to have a clear BYOD policy defining what is, and what is not, acceptable on a school\u2019s network. We must clarify expected behavior and set consequences for non-compliance. All\u00a0stakeholders, including students, must have ownership of these rules and consequences so that they are able to adhere to the policy over\u00a0the long run. Moreover, [&hellip;]<\/p>\n","protected":false},"author":28824,"featured_media":0,"parent":8,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-35","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/pages\/35","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/users\/28824"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":57,"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/pages\/35\/revisions"}],"predecessor-version":[{"id":1961,"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/pages\/35\/revisions\/1961"}],"up":[{"embeddable":true,"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/pages\/8"}],"wp:attachment":[{"href":"https:\/\/blogs.ubc.ca\/etec533byodtutorial\/wp-json\/wp\/v2\/media?parent=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}