Which of the following is MOST important to consider when developing a bring your own device (BYOD) policy?
A. Supported operating systems
B. Procedure for accessing the network
C. Application download restrictions
D. Remote wipe procedures
A. Supported operating systems
B. Procedure for accessing the network
C. Application download restrictions
D. Remote wipe procedures