As BYOD in the workplace becomes less of a trend and more of a norm, you must respond and take measures to protect your company's data.
This workbook contains the considerations you should make when creating and implementing a BYOD policy, because your sensitive data is too valuable to risk.
The steps for creating a BYOD policy that are outlined in this workbook are:
Define permitted devices and programs
Define acceptable business uses for devices under your policy
Management and security considerations for devices under your BYOD policy
Employee exit strategy