Developing data security policy for BYOD

Expert Rainer Enders offers tips for a data security policy that will ensure personal data remains secure on enterprise devices -- and vice versa.

How do I deal with personal data on business mobile devices?

A good data separation strategy is critical for any bring your own device (BYOD) environment. There are special data separation tools available on the market designed to help companies implement data security policy and specific data handling procedures. For example, document stores and document catalogs allow a company to enforce security on company documents, preventing them from being copied, transmitted or shared. Selective wipe will remove all company-related content from a device.

These security operations are focused on company-owned content. It's important to take care that personal information is not touched, as this can lead to privacy issues that are in violation of laws and regulations.

This was first published in February 2013

Dig deeper on Network Management Software, Tools and Utilities



Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: