Rider Universitys BYOD Story. First two short films…… Dilbert Humorous skit about an employee, desperate to get his work done more efficiently tries to.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Salem Health Tech Talk – iPhones, Laptops and Rogue Devices, OH MY!
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
SMARTPHONE & TABLET CONSIDERATIONS. Smartphones and Tablets – PROVIDE VALUE FOR COUNCILS Enables mobility - Streamline business process - Remote access.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
Security Controls – What Works
Developing a Records & Information Retention & Disposition Program:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
New Data Regulation Law 201 CMR TJX Video.
Welcome to BYOT PD Informational Training By: Mr. Kirkpatrick & Mr. Saintvilus.
Securing Information in the Higher Education Office.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
ESCCO Data Security Training David Dixon September 2014.
Desktop Security: Data Protection. LaptopsMobile Devices Desktop Security: Data Protection USB DrivesCDs/DVDs Cameras Video CamerasPortable Hard Drives.
Orientation to CaTS Computing and Telecommunications Services (CaTS)
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
Security considerations for mobile devices in GoRTT
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Privacy and Information Management ICT Guidelines.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
SPH Information Security Update September 10, 2010.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
KTAC Security Task Force Superintendents Update April 23, 2015.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
KRISHNA The State of Mobile Security in India The 23 rd IFIP World Computer Congress 2015 October 5 A Market Analysis and Recommendations for Enterprises.
User and Device Management
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Technology Open House STScI Technical Training Program Status Mark Abernathy December 2 nd, 2004.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Mobile Technology and Insurance Employee Benefit Programs By Scott Warner.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Moving to BYOD Gary Audin 1.
Managed IT Services JND Consulting Group LLC
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Workshifting Transform your business – empower your people.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Two account types on this campus: UWB Access AccountUW NetID Account & 1.Not everyone has one as it must be requested by your supervisor 2.You are.
The Help Desk is Dead; Long Live the Service Desk A presentation and discussion of the ongoing Service Management approach to assisting students, faculty.
TxCONNECT TX connect is a Web Based application that can be accessed from anywhere using an internet connection Parents may access TX Connect from home,
Performing Risk Analysis and Testing: Outsource or In-house
Mobile Operating Systems
CONNECT.
Mobile Data Solutions Inc
The Size of Campus – Considerations and Analyses
Future Trends in Mortgage Industry
Digital $$ Quiz Test your knowledge.
Introduction to the PACS Security
PROF-W10 Up for a Challenge? Learn How to Become a Successful Higher Education CISO Joanna Grama EDUCAUSE Neal Fisch Randy Marchany Tina Thorstenson California.
Presentation transcript:

Rider Universitys BYOD Story

First two short films…… Dilbert Humorous skit about an employee, desperate to get his work done more efficiently tries to smuggle his own laptop and smart phone into his workplace…… Consumerization of IT Things are changing, and consumerization is blurring the lines between work and life by giving folks more influence and choice over how and where they work…..

Session ID Lawrenceville Campus 3,750 undergraduates 88% of freshman live on campus College of Liberal Arts, Education and Sciences College of Business Administration School of Fine and Performing Arts College of Continuing Studies Princeton Campus 350 Undergraduates Westminster Choir College About Rider

Session ID Total Number of Employees Total Number of employees at Rider 1,302 Full Time = 749 Part Time = 553 Faculty/Staff Breakdown Faculty = 578 Staff = 724 About Rider

BYOD Program Drivers University Strategic Plan University Culture Technology Trends Cost and Support Savings

BYOD Program Goals Encourage innovation Create an option for people to have it their way Address management of constant change and consumerization of IT head-on Increase employee accountability and awareness for information privacy and security Control costs

Riders BYOD Story Growing demand to support more and more unique devices in the enterprise The mobile landscape seemed to be changing around us every week Not enough staff resources to keep up with support demands. Needed to update our mobile policy anyway to meet new regulatory guidelines

How Does Riders IT Staffing Match up with Comparable Universities? Relative IT FTE Staffing Levels Median 77.1 = Average = Middle Quartiles = Range = Rider U = Median Average 84.6

Riders BYOD Solution Foundation Policy and Guidelines Process Technology

Mobile Device Procurement/Support & Usage Policy Guidelines for the use of Mobile Devices Information and Password Security Guidelines Computer Use Policy Policy and Guidelines

Mobile Device Procurement, Support, and Usage Policy 2 Options: University assigned or BYOD Applies to phones and tablets (for now) Both require substantial business need and division head (or dean) approval Funded from business unit operating funds

Mobile Device Procurement, Support, and Usage Policy 2 Support Levels Full Support : University Assigned IT selects and issues device annually standard device, standard setup Concierge Level Support: BYOD Use personally owned device Individual fully responsible for maintenance and security IT provides settings for access to , wireless only

Mobile Device Procurement, Support, and Usage Policy Summary of Charges Allowances and charges reviewed annually Cellphones and Smartphones University issued or non-taxable allowance for BYOD. $75 per month for voice/text, $135 per month voice/text/data Tablets University issued($500 per year charge) or BYOD. Note: Both require registration in a mobile device management service for remote wipe in the event device is lost or stolen.

Guidelines for the Use of Mobile Devices Applies to smartphones,tablets, and USB drives Applies to university and any personally owned devices used for university business Guidelines based on industry standards Label the device with name and phone Passcode required to unlock device Set an idle timeout to lock the device Keep all software and operating system up to date Required enrollment in university mobile device management service in the event the device is lost or stolen If capable, enable encryption Do not jailbreak or root the device

Information and Password Security Guidelines Rider University possesses information that is sensitive and valuable, Some information is protected by federal and state laws. Diligent protection of University information is critical. Follow the mobile guidelines carefully Know how your device works! Always choose strong passwords Dont share it Dont save it online Dont write it down

Lessons Learned So Far BYOD option very popular About 50% of individuals assigned a university phone took the BYOD option right away. No data on tablets yet. Increased staff moral and productivity. Employees like the freedom of choice Employees seem more available OIT support burden reduced significantly. Increased information privacy/security awareness. Emphasis on security guidelines and accountability for BYOD making a difference across the board.

Next steps Establish Mobile Device Information Privacy and Security Guidelines Create training program /videos Audit devices in BYOD program to measure compliance with guidelines Assess program satisfaction

For more information including Policys, forms, and guidelines please visit Questions?