Developing security protocols for BYOD

But it places new demands on the management of mobile data and communications platforms, and demands that IT managers look hard at their existing security …