Appendix A: Factors to be considered for choosing BYOD . The audit logs are reviewed regularly to identify any anomaly or breach.
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-46r2.pdf
BYOD policy should state what are the companies' rights to audit and monitor privately owned devices during an investigation [17 p. 9] and this must be well
This checklist aims to provide small businesses with prompts for further action However the adoption of 'Bring Your Own Device' (BYOD)
BYOD devices must not be visible in cars and other forms of transport hotel rooms
23. Is PIN or other biometric security or multifactor authentication mechanism used by user on End User Device? 24. Is there a "Bring your own device" (BYOD)
has a BYOD audit program that helps identify specific security controls in management and IT. (ISACA 2016). However
Security requirements are different based on the organization's technology model: personally-owned via a bring your own device (BYOD) initiative or
internal audit activity can support management's efforts to mitigate risks (BYOD). Whether owned by the organization or the employee smart devices