A bring your own device policy, when done correctly, can mean a lot of positive things for businesses, but it also brings up a lot of challenges and questions that must be addressed at the start of implementation. InfoWorld's Lisa Schmeiser said one of these questions is what to do when a BYOD worker is fired, laid off or quits.

"It's a fact that some data always walks with the employees: email addresses of business contacts, or knowledge of the organization's key business practices and initiatives," she wrote. "In the old days, people slipped files into their briefcases. Digital files just mean that copying and moving information can be done quickly. Skip through the denial and anger stages and just accept that some data is inherently more vulnerable than others, and it's that vulnerable data, such as emails, that will be walking out the door."

Joshua Weiss, a mobile professional, said there is not a single way to undo what has been done on a personal device, which means companies will have to form clear policies to prevent large volumes of information from leaving when an employees does. Deciding what kind of information can be viewed or stored on mobile devices, which apps are acceptable and what level of security is in place will all be important for maintaining control of enterprise data.

EWEEK recently reported on statistics from Aruba Networks, which found that trust concerns with BYOD actually threaten corporate data. Transparency will likely be key moving forward, as the report stated a large number of employees don't trust the company with their personal information. Sixty-six percent said they feared the loss of their personal data while using their device at work, showing that it is a two-way street regarding concerns between organizations and employees. Approximately 51 percent of u.S. workers said their IT departments don't look to protect corporate files and apps on their personal devices, which adds to the concern of personal data loss.

Use a written policy
Schmeiser said it is key for organizations to come up with BYOD policies and be transparent with what they want and expect from a program. This means defining how smartphones, tablet and laptops can be acceptably used, figuring out which apps will be allowed or banned and figuring out which corporate assets can be accessed on personal devices.