Mobile investment toolkit: Device selection considerations
|
|
- Carol Melton
- 6 years ago
- Views:
Transcription
1 Mobile investment toolkit: Device selection considerations Summary notes There are many mobile devices on the market today and the scope and capabilities of these devices will continue to change and improve rapidly. You should consider the possible impact of changing device supplier in the future. There is no right or wrong answer - it s down to the requirements of your organisation and the business purpose of each mobile device. There are many factors to consider in selecting the appropriate mobile device. Input and consultation with users is crucial to ensure that the combination of devices selected meets user needs and are usable in situ. Purpose: This list summarises key considerations in selecting a device based on previous procurments and experiences in use of mobile devices purchased. DISCLAIMER This list of considerations has been assembled by HSCIC from on a variety of existing sources with a view to providing a base line for NHS trusts wishing to procure mobile capabilities. However, it does not necessarily contain the definitive set of requirements for any such procurement and NHS trusts using it, either with or without amendment, do so at their own risk. HSCIC cannot be held responsible for any gap in provision resulting from its use. 1 Copyright 2016, Health and Social Care Information Centre.
2 Area Specific considerations Features and functions Screen size Safety: There may be safety risks in using small form factors to review lists such as medications or images that are designed to be used on larger screen screens where a summary view of all data is required. Ensure all screen views can be viewed on the selected device without compromising safety. Usability: If sofware is not designed specifically to scale to the specific device then usability will be compromised. Its easy to enable mobile access but more investment can be required to optimise the software for mobile use. Screen resolution Portability Usage Battery life Protective case If using tablets, ensure the screen size is sufficient once the on screen keyboard is displayed. If not, external keyboards may be required. Is the software, functionality and use designed for touchscreens, e.g. is it mainly tickboxes or drop down lists? If a lot of information is displayed or a lot of typing is required, you may want to consider giving your users a choice of different size screens e.g. someone booking appointments and creating reports may need a different set up from someone updating a medical record. If the devices are being used to view medical images ensure that the resolution supports this e.g.mammography, x-rays require a higher resolution to review. Clinical risk is present if resolution is not sufficient. Consider the weight and practicalities of carrying the device and associated accessories (e.g. keyboard, chargers etc.). Consider if backpacks or carrying cases are also required. Communicate with HR to understand possible safety impacts for staff in the field. Work with users to understand access required to telephony, messaging, basic web services, applications and standard office software. Is the device use specific or multipurpose. E.g. can a tablet be used for a clinical app as well as and intranet access? Can it easily be linked into corporate networks where a 'portable desktop' is required? Battery life will vary when using different applications. Ideally this should be tested with the intended install to ensure that the device battery can sustain its charge adequately. Some batteries will have a finite life which is less than the device life. Be aware of this and the cost and process for replacing batteries. Be clear on how long batteries will take to charge. Understand the recommended ways of preserving battery life; e.g does the device need to be completely switched off and build this into any new work processes. Some batteries required configuration and may need to be reconfigures once in live use. Understand the requirements and plan to support this. For tablets ensure a full wrap around case is supplied to minimise breakages. This will reduce costs of replacing devices. 2 Copyright 2016, Health and Social Care Information Centre.
3 Ability to use a cross network SIM Robustness Storage Peripherals Keyboard provided External keyboards Ability to charge in car Based on local network provision ensure that you have the correct bundles or cross network SIMs or services to cater for travel accross network boundaries. In some geographic areas the organisation may want to conside using a mobile network integrator to enable a higher level of network coverage. Ensure the device is robust enough for the expected use and locations where it will be used. Ensure data storage capacity is appropriate for use. Limitations on file size attachments might apply (e.g. some photos for wound care or some patient records which need to be scanned can be quite large). Also, if users are able to download music/pacs images then larger capacity might be required. Ensure that where tablets are provided, that you allow for users who still require keyboards to input data where typing rather than picklists are required. You may need to provide external keyboards for tablets if significant typing is required or the screen size (see above) is too small with the keyboard displayed. Ensure users who require chargers are identified and provision is factored into any purchasing decisions to avoid additional procurement activities. Other peripherals Smart Card Readers Docking Stations Camera Mobile devices have varied shapes and dimensions of hardware, it is important that you determine your need for peripherals i.e. keyboards, digital pens, pointing devices; built-in ports, slots, USB slots etc. If staff will use any applications requiring smart cards, then consider options for smartcard readers. Will any users require docking stations? You may want to consider setting up fully connected docking stations in any main hubs to allows for more screen intense work/easy printing/faster connectivity for laptop users. Ensure if cameras are being used to take images to aid diagnosis or track patient progress e.g. wound care, then the quality of the camera supports this. Inbuilt camera's must be compatible with 2D and Data Matrix code scanning. Ensure this is tested and is fit for purpose for use in meetings and conference calls with Microphone multiple participants in a room. Printers Evaluate if any staff required portable printers Brackets/holders Evaluate if any modifications are required to vehicles or sites to accommodate mobile devices e.g. brackets, docking stations? Software 3 Copyright 2016, Health and Social Care Information Centre.
4 Operating system Which operating system will fit the requirements. ios, android and Microsoft Windows Mobile are the main chocies currently. See this list for a summary of features and functions to evaluate however capabilities change rapidly and wiki pages are not necessarily kept up to date consistently. Compatibility Software installed by default Bring your own device (BYOD) Your device selection is likely to be limited by your current software choices for key systems, collaborate with suppliers and user groups to understand the options which are most compatible based on their experience. Some operating systems give minimal control over upgrades and others allow control on when these are applied. This can cause issues as it might be necessary to delay the operating system upgrade to allow for the development timelines of the applications used on the devices. The organisation will need to define it's approach to software updates and apply these rules to all mobile devices. Evaluate options for Business Provisioned or BYOD? You will need to define the policy around corporate provided verses bring your own device model? Or can the trust support a mixed model based on functionality matrix? With a corporate provided device The make and model is known, it can be locked down to limit the applications /systems available. The device will have a defined support process in place. N3 connection VPN With a BYOD model, there are a number of constraints that should be considered, these may include: A code of conduct for using a BOYD The user/owner would need to agree to have a secure environment for corporate applications/data Corporate enterprise management tools must be installed No or limited support services available Information Governance and Security procedures must be implemented on the device Access to either the organisations network or N3 will need to be either an inbuilt wifi service on the device, or by use of a mobile signal service. Evaluate if the device support secure communication. Any access to clinical applications that the user requires will not directly connected to the local network must be completed via a secure communications path. Ensure that the device 4 Copyright 2016, Health and Social Care Information Centre.
5 supports the trusts VPN service. Ability to configure Device Management Security Remote wipe and tracking Support for multidisciplinary team meetings N3 compliant Packaged software After purchase Insurance End of life Device Support If devices are partitioned with a split configuration, then the organisation protected area should be limited to approved applications only. Controls will need to be in place to detect any risky applications that are installed which could compromise data security, with appropriate remedial action taken to protect the organisation. All mobile devices must be configured with an Enterprise Mobile Management suite (EMM). The organisation will need to implement a consistant use policy on the features of the EMM suite that are enabled. Consider if you need devices to be encrypted or if sufficient security will be provided by the software. All patient data must be encrypted while in transit between the device and the organisations services. Evaluate options to secure devices. Do you need to be able to track the device in case of loss or theft? Do you need to be able to remotely wipe or disable the device in case of loss or theft? If used for multidisciplinary team meetings image sharing and conferencing will be required. Is the device tested on N3 Does standard software such as MS Office come with the device pre-installed. If not ensure that a suite of "lite-office" applications can be installed and used on the device. Do device suppliers offer pre-configuration for users to decrease effort locally to configure and set up. Is there a standard insurance policy for devices that are lost, stolen and damaged and what is the service standard for replacement? What is the approach to WEEE Manufacturers have 'To provide a fully functioning return system whereby those wishing to return end-of-life electronic and electrical goods can do so.' Mobile devices will require a different support model to fixed or traditional laptops. How will this work? What level of support will be required for both the device and the aplications? Ensure that clear lines of demarcation are established around the service offering. 5 Copyright 2016, Health and Social Care Information Centre.
Acquisition & Use of University Supplied Mobile Devices Policy
Acquisition & Use of University Supplied Mobile Devices Policy 1. Introduction 2. Device Definitions 3. Principles of the Policy 4. Eligibility 5. Tariffs & Hardware 6. Administration of Mobile Contracts
More informationEnterprise Mobility Management: completing the EMM story
Enterprise Mobility Management: completing the EMM story Contents BYOD & EMM 3 Enterprise Mobility Management what is it? 4 Accessing corporate systems, apps 5 and data with EMM Apps in the container 6
More informationNHSmail Migration Communications Plan Template
NHSmail Migration Communications Plan Template June 2018 Version 2 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationPolicies, Procedures, Guidelines and Protocols. John Snell - Head of Workforce Planning, Systems and Contributors
Policies, Procedures, Guidelines and Protocols Document Details Title Staff Mobile Phone Policy Trust Ref No 2036-39774 Local Ref (optional) N/A Main points the document Procurement, allocation and use
More informationAccelerated Technology Refresh Project (ATRP) at VCH and PHC. Frequently Asked Questions
Accelerated Technology Refresh Project (ATRP) at VCH and PHC Frequently Asked Questions About the Desktop Transformation Program What is the Accelerated Technology Refresh Project? What are the costs to
More informationBHIG - Mobile Devices Policy Version 1.0
Version 1.0 Authorised by: CEO Endorsed By: Chief Operations Officer 1 Document Control Version Date Amended by Changes Made 0.1 20/01/2017 Lars Cortsen Initial document 0.2 29/03/2017 Simon Hahnel Incorporate
More informationTrinity Multi Academy Trust
Trinity Multi Academy Trust Policy: Bring Your Own Device Date of review: October 2018 Date of next review: October 2020 Lead professional: Status: Director of ICT and Data Non-Statutory Page 1 of 5 Scope
More informationInformation Security BYOD Procedure
Information Security BYOD Procedure A. Procedure 1. Audience 1.1 This document sets out the terms of use for BYOD within the University of Newcastle. The procedure applies to all employees of the University,
More informationCommunication and Telecommunications
Information Booklet Communication and Telecommunications ~ Choosing Your Device ~ Easy English Format Table of Content Communication... 3 Telecommunication... 3 Telecommunication Functions... 4 Types of
More informationBring Your Own Device (BYOD) Policy
SH IG 58 Information Security Suite of Policies Bring Your Own Device (BYOD) Policy Version 1 Summary: Keywords (minimum of 5): (To assist policy search engine) Target Audience: Next Review Date: This
More informationIf we provide the device, it is managed through Citrix XenMobile Enterprise. If you want access to our internal sites, then you have to be managed
If we provide the device, it is managed through Citrix XenMobile Enterprise. If you want access to our internal sites, then you have to be managed through Citrix XenMobile Enterprise. House member office
More informationMobile Working Policy
Mobile Working Policy Date completed: Responsible Director: Approved by/ date: Ben Westmancott, Director of Compliance Author: Ealing CCG Governing Body 15 th January 2014 Ben Westmancott, Director of
More informationFive Tips to Mastering Enterprise Mobility
Five Tips to Mastering Enterprise Mobility Table of Contents Introduction Tip 1: Assess Your Environment Tip 2: Review Security Protocols Tip 3: Be Smart About BYOD Tip 4: Consider Customized Mobility
More informationWhen saving minutes means saving lives. Windows Clinical Mobility
When saving minutes means saving lives Windows Clinical Mobility True mobility in healthcare. It s about time From home health and community care to doctors sharing their time between facilities, healthcare
More informationGeneral Dynamics Itronix GD3015 Semi-Rugged Tablet
General Dynamics Itronix Semi-Rugged Tablet The semi-rugged tablet from General Dynamics Itronix delivers the full functionality of a notebook with the critical components and options mobile professionals
More information3-Part Guide to Developing a BYOD Strategy
An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)
More informationBRING YOUR OWN DEVICE (BYOD)
BRING YOUR OWN DEVICE (BYOD) Bring your own device (BYOD) Some employees will often prefer to use their own personal mobile devices to access company networks/systems. However, this is potentially a security
More informationE-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019
Ormiston Academies Trust E-Security policy Date adopted: Autumn Term 2018 Next review date: Autumn Term 2019 Policy type Author Statutory James Miller OAT DPO Approved by Exec, July 2018 Release date July
More informationNEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?
NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:
More informationSECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti
SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external
More informationData Encryption Policy
Data Encryption Policy Document Control Sheet Q Pulse Reference Number Version Number Document Author Lead Executive Director Sponsor Ratifying Committee POL-F-IMT-2 V02 Information Governance Manager
More informationWye Valley NHS Trust. Data protection audit report. Executive summary June 2017
Wye Valley NHS Trust Data protection audit report Executive summary June 2017 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with the Data Protection Act
More informationMicrosoft 365 Business FAQs
Microsoft 365 Business FAQs Last updated April 27 th, 2018 Table of Contents General... 3 What is Microsoft 365 Business?... 3 Who should consider adopting Microsoft 365 Business?... 3 How can I get Microsoft
More informationProtecting Health Information
Agenda Protecting Health Information BRONSON HEALTHCARE GROUP INFORMATION TECHNOLOGY SECURITY ENGINEERING MICHAEL SMITH Personal device usage with sensitive data Mobile devices and BYOD Secure messaging
More informationEnterprise Mobile Management (EMM) Policies
Enterprise Mobile Management (EMM) Policies Best Practices Guide Copyright 2016 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software
More informationMobile configuration guide for NHSmail
Mobile configuration guide for NHSmail Version 3 Published July 2017 Copyright 2017Health and Social Care Information Centre. The Health and Social Care Information Centre is a non-departmental body created
More informationBroward College Telecommuting and Hoteling Technology Proposal (2017)
Broward College Telecommuting and Hoteling Technology Proposal (2017) CONTENTS Introduction... 2 Telecommuting or Telework (Offsite)... 2 Equipment, Software and Communication Requirements... 2 Standard
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationThe essential guide to creating a School Bring Your Own Device Policy. (BYOD)
The essential guide to creating a School Bring Your Own Device Policy. (BYOD) Contents Introduction.... 3 Considerations when creating a BYOD policy.... 3 General Guidelines for use (Acceptable Use Policy)....
More informationTAG GD3030 rugged tablet
white paper TAG GD3030 rugged tablet The rugged design that boost efficiency in critical situations The TAG GD3030 Makes Every Task More Efficient The TAG GD3030 is the latest 10.1 IP65 Windows tablet
More informationUSB for Portable Devices
1 USB for Portable Devices 2 USB for Desktops USB was first introduced as a solution to desktop interconnectivity ity At the time, desktops had a number of different wired interfaces Printer, mouse, keyboard,
More informationBring Your Own Device (BYOD) Information for Parents and Carers
Bring Your Own Device (BYOD) Information for Parents and Carers Overview Students attending North Lakes State College will bring their own portable computing device to the College as a tool to enhance
More informationMobile Security using IBM Endpoint Manager Mobile Device Management
Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?
More informationMANAGING THE COMPLEXITY.
AS A SERVICE MANAGING THE COMPLEXITY. HOW WILL YOU SIMPLIFY ESN MIGRATION? Control room IT solutions play a vital role in incident management. Technologies such as Integrated Communications Control Systems
More informationDate Approved: Board of Directors on 7 July 2016
Policy: Bring Your Own Device Person(s) responsible for updating the policy: Chief Executive Officer Date Approved: Board of Directors on 7 July 2016 Date of Review: Status: Every 3 years Non statutory
More informationBYOD in the Workplace. A Webanywhere Free Guide
What is BYOD? BYOD is an acronym for Bring your own device. This refers to when staff bring personally owned hardware to work. This can be anything but most commonly comprises handheld devices such as
More informationBring Your Own Device (BYOD) Policy and Procedure
Bring Your Own Device (BYOD) Policy and Procedure BYOD Policy 1. Preamble 1.1. Policy Purpose This policy is to ensure that students and staff are aware of their responsibilities regarding Bring Your Own
More informationBring Your Own Device (BYOD)
Bring Your Own Device (BYOD) Information Session Tue 30 th October 2018 3:20pm & 5:00pm Welcome Mr Anthony Lanskey Principal Topics covered during this session 1. The what, how and why of BYOD and online
More informationHP ELITEPAD 1000 G2 POWERED BY INTEL IN HEALTHCARE
HP ELITEPAD 1000 G2 POWERED BY INTEL IN HEALTHCARE * in Allscripts Wand for TouchWorks app in VitalHub Chart Every day, technology improves productivity in professional fields around the world and healthcare
More informationStudent Computer Devices 2019
Student Computer Devices 2019 This document describes technology that KWS students may encounter at different stages from 2019. Students will use different devices as they progress through school KWS provides
More informationCDW.ca/lenovo
Choose Lenovo Lenovo is built for work Lenovo has a wide selection of powerful and adaptable mobile devices, from laptop solutions to touch-enabled Windows 8 devices. CDW.ca/lenovo 800.732.8197 Why choose
More informationData ownership within governance: getting it right
Data ownership within governance: getting it right Control your data An Experian white paper Data Ownership within Governance : Getting it right - 1 Table of contents 1. Introduction 03 2. Why is data
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationWork with Lap Top computers (Portable Display Screen Equipment)
Work with Lap Top computers (Portable Display Screen Equipment) 1 Portable DSE, such as laptop and notebook computers, is subject to the Occupational Safety and Health (Display Screen Equipment) Regulations
More informationBring Your Own Device Handbook
Bring Your Own Device Handbook Introduction from the Principal In 2018, the College moved to a BYOD program for all Year 6 students and gave this choice for any student in Years 7-12. In 2019, we will
More informationData Handling Security Policy
Data Handling Security Policy May 2018 Newark Orchard School Data Handling Security Policy May 2018 Page 1 Responsibilities for managing IT equipment, removable storage devices and papers, in the office,
More informationXenApp, XenDesktop and XenMobile Integration
XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility
More informationICT Portable Devices and Portable Media Security
ICT Portable Devices and Portable Media Security Who Should Read This Policy Target Audience All Trust Staff, contractors, and other agents, who utilise trust equipment and access the organisation s data
More informationCABOOLTURE STATE HIGH SCHOOL BRING YOUR OWN DEVICE PROGRAM INFORMATION
LOGO DESIGN: JACKSON LANYON 10B2 CABOOLTURE STATE HIGH SCHOOL BRING YOUR OWN DEVICE 2018-19 - PROGRAM INFORMATION www.cabooltureshs.eq.edu.au byod@cabooltureshs.eq.edu.au 54980111 Bring Your Own Device
More informationBYOD Portal Information Pack
BYOD Portal Information Pack 2015 Program Page 1 of 11 Contents Why Dell?... 3 About Datacom Systems... 3 Dell Warranty, Accidental Damage and Insurance options... 3 Dell Pro Support Onsite Warranty Solution
More informationBring Your Own Device Policy
Bring Your Own Device Policy 2015 City of Glasgow College Charity Number: SCO 36198 Page 1 of 9 Table of Contents 1. Introduction... 3 2. Purpose and Aims... 4 3. Scope... 4 4. Policy Statement... 5 4.1
More informationIntroducing. Worldpay Total. Worldpay international omni-channel payment solution
Introducing Worldpay Total Worldpay international omni-channel payment solution All your channels, connected Whatever the sales channel, however your customers want to pay, Worldpay Total has it covered.
More informationTHREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017
THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017 An IT Architect s Guide to Implementation Considerations and Best Practices When Developing a BYOD Strategy As the consumerization
More informationCloud Computing Standard 1.1 INTRODUCTION 2.1 PURPOSE. Effective Date: July 28, 2015
Cloud Computing Standard Effective Date: July 28, 2015 1.1 INTRODUCTION Cloud computing services are application and infrastructure resources that users access via the Internet. These services, contractually
More information<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Allowed Personally Owned Device Policy Every 2 years or as needed Purpose: A personally owned information system or device
More informationMaaS360 Secure Productivity Suite
MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity
More informationTAG GD700 rugged tablet
white paper TAG GD700 rugged tablet Designed to be ready for always-connected duty The TAG GD700 Suitable for a wide range of deployments The TAG GD700 is a 7-inch tablet that s part of TAG Global System
More informationProcedure: Bring your own device
Procedure: Bring your own device Purpose This procedure defines the obligations for all authorised users who choose to connect a personally owned device to the University s network or who use their personal
More informationZM Schools 1:1 Mobile Device Program for
ZM Schools 1:1 Mobile Device Program for 2017-18 ZM will continue the very successful model we implemented last year with students in grades 6-12 being required to carry a personal mobile device every
More informationRemote Working & Mobile Devices Security Standard
TRUST-WIDE NON-CLINICAL DOCUMENT Remote Working & Mobile Devices Security Standard Standard Number: Scope of this Document: Recommending Committee: Approving Committee: SS02 All Staff Joint Information
More informationCatalogue. Assembling... 1 Unpack Charge the Battery Install the Memory Card Product Basics Buttons and Connections...
Catalogue Assembling... 1 Unpack... 1 Charge the Battery... 1 Install the Memory Card... 1 1 Product Basics... 2 1.1 Buttons and Connections... 2 1.2 Start Up and Shut Down... 2 2 Introduction of Google
More informationITONLINEEXAM.COM. Chapter 1 Basic Introduction to Computers
ITONLINEEXAM.COM Chapter 1 Basic Introduction to Computers A World of Computers Computers are everywhere 2 What Is a Computer? A computer is an electronic device, operating under the control of instructions
More informationTable of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationAVANTUS TRAINING PTE LTD
[ICDL-CS]: WSQ ICDL Computer Essentials Length Technology Delivery Method : 2 Days : Computers, Microsoft Windows : Instructor-led (Classroom) Course Overview This module sets out essential concepts and
More informationNew Schools Teacher Workstation and Classroom Summary
Teacher Workstation and Classroom Summary Workstation: Mobile Device Printer: All Schools, All Classrooms NISD Approved Desktop In HS GT, Journalism and Photography Classrooms, Apple imac Computer is provided
More informationGuide Series. How to upgrade to Microsoft Windows 10? Guide Series
How to upgrade to Microsoft Windows 10? Acuutech All rights reserved 2016 1 Contents Introduction... 2 Why use Windows 10?... 3 What are the advantages of Windows 10?... 4 Windows 10 editions comparison...
More informationBring Your Own Device (BYOD) Launches September, 2017 Now Includes Students in Grades The How of BYOD. Preparing the Learners
Bring Your Own Device (BYOD) Launches September, 2017 Now Includes Students in Grades 7-12 The How of BYOD How is the school preparing for a successful launch of a BYOD for students in Grades 7 8? This
More information2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines
2016 HSC Information and Digital Technology Networking and hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 B 3 A 4 D 5 A 6 D 7 B 8 A 9 B 10 C 11 B 12 C 13 A 14 C
More informationData protection policy
Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees
More informationBring Your Own Device 2018 Handbook
Bring Your Own Device 2018 Handbook Introduction from the Principal In recent years the College has provided a laptop for each student from Years 6-12. This centrally driven and supported model for the
More informationUsing GIGABYTE Tablet PC for the First Time
Congratulations on your purchase of the GIGABYTE Tablet PC! This manual will help you to get started with setting up your Tablet PC. The final product configuration depends on the model at the point of
More informationFY18 ITS Service Rates
Updated by Richard Hu Updated on 4/25/17 FY18 ITS Service Rates Desktops, Laptops, Mobile & Other Devices Standard Devices FY18 Rate New Connection, Replacement, Reconnect, FY17 Rate Relocation Standard
More informationIntroducing K-12 Solutions for:
Introducing K-12 Solutions for: Mobile Devices Collaboration Software Mobile Peripherals Content Filtering Mobile Device Management (MDM) Curriculum Configuration Services Wireless Infrastructure Learning
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationIs your business future ready?
Is your business future ready? Does your organization have this user type? On-the-Go-Pro Convenience: Connectivity: Comfort: Be more mobile with lightweight, portable devices. Stay connected, and even
More informationDELL BYOD Portal Information Pack
DELL BYOD Portal Information Pack 2017 Program Page 1 of 13 Contents Why Dell?... 3 About Datacom Systems... 3 Dell Warranty, Accidental Damage and Insurance options... 3 Dell Pro Support Onsite Warranty
More informationManaging Windows 8.1 Devices with XenMobile
Managing Windows 8.1 Devices with XenMobile Mobile Device Management for Windows 8.1 Devices The Bring Your Own Device Challenge With the advent of the bring your own device (BYOD) trend, employees expect
More informationINDIA The Changing Face of the Workplace: Going Light and Mobile
An IDC InfoBrief May 2016 Commissioned by Executive Summary In today s hypercompetitive business environment, organizations are pushing for greater efficiencies to drive business growth. The growing diversity
More informationHealthcare mobility: selecting the right device for better patient care
Healthcare mobility: selecting the right device for better patient care How Fujitsu Mobile Solutions help accelerate digital transformation with human-centric innovation* Fujitsu Thought Leadership Report
More informationNHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy
NHS Gloucestershire Clinical Commissioning Group 1 Document Control Title of Document Gloucestershire CCG Author A Ewens (Emergency Planning and Business Continuity Officer) Review Date February 2017 Classification
More informationAccessing CharityMaster data from another location
Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto
More informationInformation backup - diagnostic review Abertawe Bro Morgannwg University Health Board. Issued: September 2013 Document reference: 495A2013
Information backup - diagnostic review Abertawe Bro Morgannwg University Health Board Issued: September 2013 Document reference: 495A2013 Status of report This document has been prepared for the internal
More informationManaging BYOD Networks
Managing BYOD Networks SPS-2013 Raghu Iyer raghu.iyer@nevisnetworks.com 1 What is BYOD Bring Your Own Device Are you allowing a Rogue? SPS-2013 Raghu Iyer raghu.iyer@nvisnetworks.com 2 Why BYOD Increased
More informationMOBILE DEVICES FOR SURVEY WORK
MOBILE DEVICES FOR SURVEY WORK Guidelines for administrators (Sep 6, 2013) Mobile Devices: Android-based phones and tablets, also referred to as mobile devices, have become a reliable tool in assisting
More informationBYOD AT GLENWOOD HIGH SCHOOL 2018 2 Dear Parent / Carer Glenwood High School uses a BYOD model where parents are given the option of purchasing a device of their choosing, as long as it meets a set of
More informationGMSS Information Governance & Cyber Security Incident Reporting Procedure. February 2017
GMSS Information Governance & Cyber Security Incident Reporting Procedure February 2017 Review Date; April 2018 1 Version Control: VERSION DATE DETAIL D1.0 20/04/2015 First Draft (SC) D 2.0 28/04/2015
More informationDeployments Teacher Workstation and Classroom Summary
Teacher Workstation and Classroom Summary All Schools, All Classrooms Workstation: NISD Approved Desktop In HS GT, Journalism and Photography Classrooms, Apple imac Computer is provided for teacher. Mobile
More informationHIPAA and HIPAA Compliance with PHI/PII in Research
HIPAA and HIPAA Compliance with PHI/PII in Research HIPAA Compliance Federal Regulations-Enforced by Office of Civil Rights State Regulations-Texas Administrative Codes Institutional Policies-UTHSA HOPs/IRB
More informationBring Your Own Device (BYOD)
Bring Your Own Device (BYOD) Guidelines/FAQs July 27, 2012 1 As new and emerging technologies continue to change the world we live in, they also provide an opportunity for many unique and positive educational
More informationRugged Computing Range
Rugged Computing Range A leader in the global ICT Industry, MiTAC International Corp. was founded in 1982, and designs and manufactures awardwinning technology products for the automotive, enterprise,
More informationUser Guide. CG666 Page 2. Open the back cover and remove the battery. Insert the SIM card correctly in the card slot as shown below.
GET TO KNOW YOUR PHONE... 2 INSERT SIM AND MEMORY CARD... 2 CHARGE THE BATTERY VIA POWER SOCKET OR USB... 4 HELPFUL KEYS AND SHORTCUTS...5 SWITCH PHONE ON/OFF... 6 LOCK/UNLOCK THE PHONE... 6 MAKE A CALL...
More informationIntroduction to Android Tablets and Smartphones
The name Android describes mobile devices which use the Android operating system developed by Google and used in many brands of Smartphones and Tablets types and models. Such as Samsung, Sony, Aldi, Huawie,
More information- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more
- Samsung Tablet Photo - Tablets Mean Business Survey of IT pros reflects growing trend toward tablets for workforce mobility and more Table of contents Introduction 2 Giving employees what they want pays
More informationRethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.
Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now
More informationDell BYOD Portal Information Pack
Dell BYOD Portal Information Pack 2016-2017 Program Kelvin Grove State College BYOD Portal Site https://myschoolshop-qld.datacom.com.au/kgsc Access Key: kgsc Pin: f5j3pc Page 1 of 12 Contents Why Dell?...
More informationFinancial Conduct Authority. Financial Crime : A Guide for Firms
WHITEPAPER Financial Conduct Authority Financial Conduct Authority Financial Crime : A Guide for Firms Summary The Financial Conduct Authority regulates the financial services industry in the UK. Tackling
More informationTypes of Computers. Computer Technology (S1 Obj 1-1)
Types of Computers Computer Technology (S1 Obj 1-1) Introduction There are many different types of computers available today. They are categorized into different types depending on their size and processing
More informationDell BYOD Portal Information Pack
Dell BYOD Portal Information Pack 2018 Program Page 1 of 15 Contents Why Dell?... 3 About Datacom Systems... 3 Dell Warranty, Accidental Damage and Insurance options... 3 Dell Pro Support Onsite Warranty
More informationRemote Working Policy
[Type text] [Type text] [Type text] Information Management & Policy Services (IMPS) Remote Working Policy 1 Scope and definitions 1.1 This policy applies to all staff who use or access University systems
More information