From Glitchdata
Revision as of 02:03, 13 October 2021 by Jasonchen (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Bring your own Device -

  • FIRST step - A stringent assessment process is critical to comply with corporate and regulatory requirements around policies, encryption, detection of jailbreaking or rooted devices, etc.
  • SECOND step - For device access to be determined on the basis of approval status, an assessment process must be in place to grant approval.