As more and more new portable devices hit the market, Bring Your Own Device initiatives are great for connecting people in a flexible way. Knowing how to use these initiatives in a way that protects the organization is another story. Scott Lowe highlights these mistakes in implementation:
• Limiting devices by specific models
• Excluding the right to wipe the device
• Allowing opt out of critical upgrades
• Allowing opt out of corporate data management policies
Planning BYOD with these mistakes in mind will save the CIO from some BYODC later (Bring Your Own Damage Control).