at present, students are not allowed personal devices in school for accessing the internet. However there is an increasing trend towards possession of portable computing devices such as iPads, laptops etc. and many students now include such devices as part of their normal workflow, particularly in specialist subjects such as art or music that might have specific tools available on these platforms. These devices, if brought in, are currently limited by not being connected to the internet. Proposal:
such devices could, after suitable preparations, be allowed access to the internet. The connection available would be filtered in line with current KS5 levels, and the option would only be available to sixth formers. Benefits:
Greater availability of IT at low cost to us
Greater flexibility for students who want to use personal resources
May better engage students Disadvantages:
Would require the instigation of a technical project that would certainly involve a significant investment of time, and potentially budget.
Work would be saved in a single location rather than on the network; therefore if students forget their device their work will be completely unavailable and there will be no regular backup of their work. Despite warnings of these limitations students are likely to favour working on personal devices still.
Danger of loss of expensive personal equipment (particularly on public transport to and from school)
Possibly lead to poorer students feeling excluded
May offer a greater distraction to students, as personal devices are likely to have personal data (e.g. photos) and possibly games available.
Should personal devices be allowed, IT Support will be unable to support them to prevent abuse of our services and prevent strain on our time supporting a large number of myriad devices.
If popular, would likely require investment in improving our wireless coverage, ideally with a managed (intelligent) system (5 figure cost).
Security risk from viruses steps can be taken to mitigate this but there will always be a risk from zero-day exploits that havent been seen before