If a device is accessing your network and you are not the owner, then you do not have the ultimate control of that device.
For example, if an employee is using their tablet, laptop or cellphone and have saved sensitive information to them or even saved secure website address es and passwords, who owns that data?
They do! Although you can request that they delete that critical information, it’s up to them to follow through.
A few other considerations:
- Keeping their devices in compliance
- Approved apps
- Securing the device
- Accessing corporate data
- Keeping personal information separate and secure
- Monitor for non-compliance
Think hard before allowing BYOD and have a policy in place to protect yourself, and your employees.