{"id":10836,"date":"2012-12-19T11:56:00","date_gmt":"2012-12-19T16:56:00","guid":{"rendered":"http:\/\/devweb.rjrinnovations.com\/10-steps-for-writing-a-secure-byod-policy-2\/"},"modified":"2016-10-13T10:20:14","modified_gmt":"2016-10-13T14:20:14","slug":"10-steps-for-writing-a-secure-byod-policy-2","status":"publish","type":"post","link":"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/","title":{"rendered":"10 Steps for Writing a Secure BYOD Policy"},"content":{"rendered":"<p><!--[fusion_builder_container hundred_percent=\"yes\" overflow=\"visible\"][fusion_builder_row][fusion_builder_column type=\"1_1\" background_position=\"left top\" background_color=\"\" border_size=\"\" border_color=\"\" border_style=\"solid\" spacing=\"yes\" background_image=\"\" background_repeat=\"no-repeat\" padding=\"\" margin_top=\"0px\" margin_bottom=\"0px\" class=\"\" id=\"\" animation_type=\"\" animation_speed=\"0.3\" animation_direction=\"left\" hide_on_mobile=\"no\" center_content=\"no\" min_height=\"none\"][if gte mso 9]><xml> <o:DocumentProperties>  <o:Revision>0<\/o:Revision>  <o:TotalTime>0<\/o:TotalTime>  <o:Pages>1<\/o:Pages>  <o:Words>905<\/o:Words>  <o:Characters>5162<\/o:Characters>  <o:Company>Rjrinnovations <\/o:Company>  <o:Lines>43<\/o:Lines>  <o:Paragraphs>12<\/o:Paragraphs>  <o:CharactersWithSpaces>6055<\/o:CharactersWithSpaces>  <o:Version>14.0<\/o:Version> <\/o:DocumentProperties> <o:OfficeDocumentSettings>  <o:AllowPNG\/> <\/o:OfficeDocumentSettings><\/xml><![endif]--> <!--[if gte mso 9]><xml> <w:WordDocument>  <w:View>Normal<\/w:View>  <w:Zoom>0<\/w:Zoom>  <w:TrackMoves\/>  <w:TrackFormatting\/>  <w:PunctuationKerning\/>  <w:ValidateAgainstSchemas\/>  <w:SaveIfXMLInval>false<\/w:SaveIfXMLInvalid>  <w:IgnoreMixedContent>false<\/w:IgnoreMixedContent>  <w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText>  <w:DoNotPromoteQF\/>  <w:LidThemeOther>EN-US<\/w:LidThemeOther>  <w:LidThemeAsian>JA<\/w:LidThemeAsian>  <w:LidThemeComplexScript>X-NONE<\/w:LidThemeComplexScript>  <w:Compatibility>   <w:BreakWrappedTables\/>   <w:SnapToGridInCell\/>   <w:WrapTextWithPunct\/>   <w:UseAsianBreakRules\/>   <w:DontGrowAutofit\/>   <w:SplitPgBreakAndParaMark\/>   <w:EnableOpenTypeKerning\/>   <w:DontFlipMirrorIndents\/>   <w:OverrideTableStyleHps\/>   <w:UseFELayout\/>  <\/w:Compatibility>  <m:mathPr>   <m:mathFont m:val=\"Cambria Math\"\/>   <m:brkBin m:val=\"before\"\/>   <m:brkBinSub m:val=\"--\"\/>   <m:smallFrac m:val=\"off\"\/>   <m:dispDef\/>   <m:lMargin m:val=\"0\"\/>   <m:rMargin m:val=\"0\"\/>   <m:defJc m:val=\"centerGroup\"\/>   <m:wrapIndent m:val=\"1440\"\/>   <m:intLim m:val=\"subSup\"\/>   <m:naryLim m:val=\"undOvr\"\/>  <\/m:mathPr><\/w:WordDocument><\/xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState=\"false\" DefUnhideWhenUsed=\"true\"   DefSemiHidden=\"true\" DefQFormat=\"false\" DefPriority=\"99\"   LatentStyleCount=\"276\">  <w:LsdException Locked=\"false\" Priority=\"0\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Normal\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"heading 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 7\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 8\"\/>  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 9\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 7\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 8\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"toc 9\"\/>  <w:LsdException Locked=\"false\" Priority=\"35\" QFormat=\"true\" Name=\"caption\"\/>  <w:LsdException Locked=\"false\" Priority=\"10\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Title\"\/>  <w:LsdException Locked=\"false\" Priority=\"1\" Name=\"Default Paragraph Font\"\/>  <w:LsdException Locked=\"false\" Priority=\"11\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Subtitle\"\/>  <w:LsdException Locked=\"false\" Priority=\"22\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Strong\"\/>  <w:LsdException Locked=\"false\" Priority=\"20\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Emphasis\"\/>  <w:LsdException Locked=\"false\" Priority=\"59\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Table Grid\"\/>  <w:LsdException Locked=\"false\" UnhideWhenUsed=\"false\" Name=\"Placeholder Text\"\/>  <w:LsdException Locked=\"false\" Priority=\"1\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"No Spacing\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" UnhideWhenUsed=\"false\" Name=\"Revision\"\/>  <w:LsdException Locked=\"false\" Priority=\"34\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"List Paragraph\"\/>  <w:LsdException Locked=\"false\" Priority=\"29\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Quote\"\/>  <w:LsdException Locked=\"false\" Priority=\"30\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Intense Quote\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 1\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 2\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 3\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 4\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 5\"\/>  <w:LsdException Locked=\"false\" Priority=\"60\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Shading Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"61\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"62\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Light Grid Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"63\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"64\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Shading 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"65\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"66\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium List 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"67\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 1 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"68\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 2 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"69\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Medium Grid 3 Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"70\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Dark List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"71\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Shading Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"72\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful List Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"73\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" Name=\"Colorful Grid Accent 6\"\/>  <w:LsdException Locked=\"false\" Priority=\"19\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Subtle Emphasis\"\/>  <w:LsdException Locked=\"false\" Priority=\"21\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Intense Emphasis\"\/>  <w:LsdException Locked=\"false\" Priority=\"31\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Subtle Reference\"\/>  <w:LsdException Locked=\"false\" Priority=\"32\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Intense Reference\"\/>  <w:LsdException Locked=\"false\" Priority=\"33\" SemiHidden=\"false\"    UnhideWhenUsed=\"false\" QFormat=\"true\" Name=\"Book Title\"\/>  <w:LsdException Locked=\"false\" Priority=\"37\" Name=\"Bibliography\"\/>  <w:LsdException Locked=\"false\" Priority=\"39\" QFormat=\"true\" Name=\"TOC Heading\"\/> <\/w:LatentStyles><\/xml><![endif]--> <!--[if gte mso 10]><![endif]-->   <!--StartFragment--> <\/p>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">Bring Your Own Device, or BYOD, is a topic that is not going away \u2013 smartphones and tablets are being adopted at such a high rate that companies are almost compelled to support them. When a CEO, managing partner, or principal of a firm wants to use his or her device, IT sometimes has no choice but to support it and find ways to secure it.<o:p><\/o:p><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">BYOD is a net positive for organizations as it promotes more responsiveness, more accessibility for workers, and higher worker satisfaction with being able to work on their schedule. However, IT staff responsible for corporate security now have a new and complex challenge to solve \u2013 supporting employees who bring their own devices into the corporate fold while maintaining the security and confidentiality of sensitive company data. CIOs know that it\u2019s not just a technical issue but that BYOD may also require corporate policy changes and additional education for end users.<o:p><\/o:p><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">Corporate security policies vary by industry vertical as well as within specific verticals. The nature of electronic data that a company may gather, process, and disseminate can vary greatly. The increasing scrutiny required today, the demand for more privacy, and regulatory requirements, are forcing companies to create more stringent policies.<o:p><\/o:p><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">At odds with this is the increased porosity due to a more connected and networked environment. Synchronization applications, remote access, VPNs, and cor-porate portals create a sieve that IT must plug to ensure only au-thorized users have access to internal information or risk violating some information security policy. Personal apps also pose risks \u2013 rogue applications installed by the user potentially have access to sensitive corporate data because the device is now tied into the company\u2019s network.<o:p><\/o:p><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">The main security challenge lies in the dual-use nature of mobile devices \u2013 a stolen or lost corporate laptop, on the one hand, will probably already have security measures built in such as whole disk encryption and authentication requirements. But smartphones and tablets, especially personal devices, eschew these added layers of protection in favor of ease of use, simplicity, and quick access.<o:p><\/o:p><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">One of the biggest new dangers of BYOD is the latest crop of Dropbox-style synchronization applications. By poking a hole in the corporate security fabric to synchronize files to a mobile device, the user is potentially creating a new channel through which confiden-tial corporate information could leak. Many companies have decid-ed to shut off access to these synchronization tools until there\u2019s a way to manage them as enterprise applications with centralized control, granular permissioning, and integration with directory au-thentication services.<o:p><\/o:p><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">So how do you prepare your organization to handle these additional security risks? What steps can you take to extend your current network security to cover these mobile security holes?<o:p><\/o:p><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">Mobile devices are simply the latest vector to threaten corporate security, but there are remedies to these threats that will satisfy both the IT group and end users. The following is a 10-point list to help you think about the framework for a BYOD policy that can help you meet your security requirements. There\u2019s no single solution that will solve all issues but rather a combination of policies, education, best practices, and third party solutions that can help protect your organization:<\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white;\"><b style=\"font-family: Arial, Helvetica, sans-serif;\">1. Review your current security policies for web applications<\/b><span style=\"font-family: Arial, Helvetica, sans-serif;\"> (CRM, email, portals), VPN, and remote access. Most of these will apply to mobile devices as well.<\/span><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white;\"><b style=\"font-family: Arial, Helvetica, sans-serif;\">2. Determine which devices you are willing to support.<\/b><span style=\"font-family: Arial, Helvetica, sans-serif;\"> \u2013 Not all devices will meet the security requirements of your organization. Also, physically inspect each device and make sure it hasn\u2019t been jailbroken or rooted.<\/span><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white;\"><b style=\"font-family: Arial, Helvetica, sans-serif;\">3. Set expectations clearly.<\/b><span style=\"font-family: Arial, Helvetica, sans-serif;\"> IT may have to radically change people\u2019s current mindset. Yes, security adds additional layers to wade through, but what havoc would a security breach cause?<\/span><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white;\"><b style=\"font-family: Arial, Helvetica, sans-serif;\">4. Write clear and concise policies for all employees who want to use their personal device.<\/b><span style=\"font-family: Arial, Helvetica, sans-serif;\"> Have anyone participating in BYOD sign your terms of use. Those who choose not to follow your policies should not expect to use their devices.<\/span><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><b><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">5. Make a personal identification number (PIN) mandatory.<\/span><\/b><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white;\"><b style=\"font-family: Arial, Helvetica, sans-serif;\">6. Enforce encryption of data at rest<\/b><span style=\"font-family: Arial, Helvetica, sans-serif;\"> \u2013 any apps that download and store data on the device should protect that data. If a PIN or passcode is cracked, you want to make sure that data is still protected.<\/span><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white;\"><b style=\"font-family: Arial, Helvetica, sans-serif;\">7. Determine which types of apps are off-limits.<\/b><span style=\"font-family: Arial, Helvetica, sans-serif;\"> With hundreds of thousands of apps available, which will you permit? Are there any specific applications or class of applications you want to keep off the device?<\/span><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white;\"><b style=\"font-family: Arial, Helvetica, sans-serif;\">8. Provide training to employees<\/b><span style=\"font-family: Arial, Helvetica, sans-serif;\"> to make sure they understand how to correctly use their applications, make the most of their mobile capabilities, and watch for suspicious activity. Once you\u2019ve embraced BYOD, promote it.<\/span><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white;\"><b style=\"font-family: Arial, Helvetica, sans-serif;\">9. As mobile devices become conduits for information to flow, look for apps that include auditability, reporting, and centralized management.<\/b><span style=\"font-family: Arial, Helvetica, sans-serif;\"> Many current apps will not meet this requirement.<\/span><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white;\"><b style=\"font-family: Arial, Helvetica, sans-serif;\">10. Consider mobile device management software<\/b><span style=\"font-family: Arial, Helvetica, sans-serif;\"> that can provide secure client applications like email and web browsers, over the air device application distribution, configuration, monitoring, and remote wipe capability. Note that some providers require applications to be re-written specifically to support their platform, so you may find some of your applications will not run in the solution you pick.<\/span><\/span><\/div>\n<div><\/div>\n<div><span style=\"color: white;\"><span style=\"font-family: Arial, Helvetica, sans-serif;\">\u00a0<\/span><span style=\"font-family: Arial, Helvetica, sans-serif;\">As technology evolves, so will BYOD policies and practices. Just when you think you\u2019ve covered all your bases, a new \u201cmust have\u201d app demanded by your user population will break it \u2013 and you\u2019ll have to find ways to accom-modate the app. But by defining your overall goals and setting up guidelines and policies early you can lay the foundation as well as provide the flexibility you need to meet your security requirements to keep up with changing trends.<\/span><\/span><\/div>\n<div><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">By: Bill Ho<o:p><\/o:p><\/span><\/div>\n<div style=\"margin-bottom: 15.0pt; mso-layout-grid-align: none; mso-pagination: none; text-autospace: none;\"><span style=\"color: white; font-family: Arial, Helvetica, sans-serif;\">Original Article: <a href=\"http:\/\/www.zdnet.com\/10-steps-for-writing-a-secure-byod-policy-7000006170\/\">http:\/\/www.zdnet.com\/10-steps-for-writing-a-secure-byod-policy-7000006170\/<\/a><\/span><\/div>\n<p>[\/fusion_builder_column][\/fusion_builder_row][\/fusion_builder_container]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bring Your Own Device, or BYOD, is a topic that is not going away \u2013 smartphones and tablets are being adopted at such a high rate that companies are almost compelled to support them. When a CEO, managing partner, or principal of a firm wants to use his or her  [&#8230;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[39],"class_list":["post-10836","post","type-post","status-publish","format-standard","hentry","category-blog-fr","tag-english-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 Steps for Writing a Secure BYOD Policy<\/title>\n<meta name=\"description\" content=\"Bring Your Own Device, or BYOD, is a topic that is not going away.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Steps for Writing a Secure BYOD Policy\" \/>\n<meta property=\"og:description\" content=\"Bring Your Own Device, or BYOD, is a topic that is not going away.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RJR Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-19T16:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-13T14:20:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RJRInnovations\" \/>\n<meta name=\"twitter:site\" content=\"@RJRInnovations\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/10-steps-for-writing-a-secure-byod-policy-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/10-steps-for-writing-a-secure-byod-policy-2\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"10 Steps for Writing a Secure BYOD Policy\",\"datePublished\":\"2012-12-19T16:56:00+00:00\",\"dateModified\":\"2016-10-13T14:20:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/10-steps-for-writing-a-secure-byod-policy-2\\\/\"},\"wordCount\":967,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"keywords\":[\"English @fr\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/10-steps-for-writing-a-secure-byod-policy-2\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/10-steps-for-writing-a-secure-byod-policy-2\\\/\",\"name\":\"10 Steps for Writing a Secure BYOD Policy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\"},\"datePublished\":\"2012-12-19T16:56:00+00:00\",\"dateModified\":\"2016-10-13T14:20:14+00:00\",\"description\":\"Bring Your Own Device, or BYOD, is a topic that is not going away.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/10-steps-for-writing-a-secure-byod-policy-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/10-steps-for-writing-a-secure-byod-policy-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/10-steps-for-writing-a-secure-byod-policy-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Steps for Writing a Secure BYOD Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"name\":\"RJR Innovations\",\"description\":\"Connect your business... All of IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rjrinnovations.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\",\"name\":\"RJR Innovations\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"contentUrl\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"width\":400,\"height\":237,\"caption\":\"RJR Innovations\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RJR-Innovations-107107129324171\\\/\",\"https:\\\/\\\/x.com\\\/RJRInnovations\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rjr-innovations\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/RJRInnovations\"]},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Steps for Writing a Secure BYOD Policy","description":"Bring Your Own Device, or BYOD, is a topic that is not going away.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/","og_locale":"fr_FR","og_type":"article","og_title":"10 Steps for Writing a Secure BYOD Policy","og_description":"Bring Your Own Device, or BYOD, is a topic that is not going away.","og_url":"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/","og_site_name":"RJR Innovations","article_publisher":"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","article_published_time":"2012-12-19T16:56:00+00:00","article_modified_time":"2016-10-13T14:20:14+00:00","twitter_card":"summary_large_image","twitter_creator":"@RJRInnovations","twitter_site":"@RJRInnovations","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/#article","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/"},"author":{"name":"","@id":""},"headline":"10 Steps for Writing a Secure BYOD Policy","datePublished":"2012-12-19T16:56:00+00:00","dateModified":"2016-10-13T14:20:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/"},"wordCount":967,"publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"keywords":["English @fr"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/","url":"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/","name":"10 Steps for Writing a Secure BYOD Policy","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/#website"},"datePublished":"2012-12-19T16:56:00+00:00","dateModified":"2016-10-13T14:20:14+00:00","description":"Bring Your Own Device, or BYOD, is a topic that is not going away.","breadcrumb":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rjrinnovations.com\/fr\/10-steps-for-writing-a-secure-byod-policy-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rjrinnovations.com\/fr\/"},{"@type":"ListItem","position":2,"name":"10 Steps for Writing a Secure BYOD Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.rjrinnovations.com\/#website","url":"https:\/\/www.rjrinnovations.com\/","name":"RJR Innovations","description":"Connect your business... All of IT","publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rjrinnovations.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rjrinnovations.com\/#organization","name":"RJR Innovations","url":"https:\/\/www.rjrinnovations.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","contentUrl":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","width":400,"height":237,"caption":"RJR Innovations"},"image":{"@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","https:\/\/x.com\/RJRInnovations","https:\/\/www.linkedin.com\/company\/rjr-innovations","https:\/\/www.youtube.com\/user\/RJRInnovations"]},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/comments?post=10836"}],"version-history":[{"count":0,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10836\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/media?parent=10836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/categories?post=10836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/tags?post=10836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}