Manage Learn to apply best practices and optimize your operations.

Developing data security policy for BYOD

Expert Rainer Enders offers tips for a data security policy that will ensure personal data remains secure on enterprise devices -- and vice versa.

How do I deal with personal data on business mobile devices?

A good data separation strategy is critical for any bring your own device (BYOD) environment. There are special data separation tools available on the market designed to help companies implement data security policy and specific data handling procedures. For example, document stores and document catalogs allow a company to enforce security on company documents, preventing them from being copied, transmitted or shared. Selective wipe will remove all company-related content from a device.

These security operations are focused on company-owned content. It's important to take care that personal information is not touched, as this can lead to privacy issues that are in violation of laws and regulations.

This was last published in February 2013

Dig Deeper on Network management and monitoring

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.