Developing data security policy for BYOD

How do I deal with personal data on business mobile devices?

    Requires Free Membership to View

A good data separation strategy is critical for any bring your own device (BYOD) environment. There are special data separation tools available on the market designed to help companies implement data security policy and specific data handling procedures. For example, document stores and document catalogs allow a company to enforce security on company documents, preventing them from being copied, transmitted or shared. Selective wipe will remove all company-related content from a device.

These security operations are focused on company-owned content. It's important to take care that personal information is not touched, as this can lead to privacy issues that are in violation of laws and regulations.

This was first published in February 2013

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: