7. Set Up an Employee Exit Strategy.
Don't forget about what will happen when employees with devices on your BYOD platform leave the company. How do you enforce the removal of access tokens, e-mail access, data and other proprietary applications and information?
It's not as simple as having the employee return the corporate-issued phone. In this case, many companies choose to rely on disabling email or synchronization access as part of the exit interview and HR checklists, while more security-conscious companies choose to perform a wipe of the BYOD-enabled device as a mandatory exit strategy. You should have a clear methodology for backing up the user's personal photos and personally-purchased applications prior to this "exit wipe. Proactively reach out to affected users to help them take part in this process-all while making it clear that you reserve the right to issue a wipe command if the employee hasn't made alternate arrangement with your IT department prior to his or her exit time.
Sign up for CIO Asia eNewsletters.