iPads, however, are a different story. Apple’s iOS sandboxing requirement for apps limits the ability of third-party developers to implement on-device filtering options that mirror what can be done on a Mac or PC. Proxy settings are technically an option, but the likely use of an iPad on multiple networks outside of the school’s network can make it difficult to implement them effectively.At this point, there are two approaches that schools can take to comply with these kinds of regulations. The first is to invest in an alternate iOS browser that include filtering capabilities. With a so-called safe browser installed and configured, Safari can be blocked using the iOS Restrictions feature. Any web access from the alternate browser complies with filtering laws. Certain other content restrictions can also be enabled for built-in iOS apps like YouTube. The problem is that a number of apps include built-in browsers that won’t be impacted by this approach. That presents a challenge to app selection and management, but may not be a deal breaker.Some safe browser options, which schools (or parents) may want to consider include K9, Mobicip, Child Safe.The other, more effective, option is to configure a VPN connection on each iPad, set it to apply for all Internet traffic, and make it mandatory for all Internet access off campus. That’s not difficult to do with mobile device management. When an iPad isn’t on the school’s network, it automatically connects to the school network via VPN and all traffic is routed through that connection and thus through the school’s filtering solution. The challenge here is that it will increase the load on the school network and Internet connectivity. More information about this approach can be found in Mobile Iron’s 23,000 Students, 7,000 iPads & iPhones webinar.Not all schools will need to meet these requirements by law or by policy, but even schools that aren’t required to do so may still choose to, anyway.