Information Security

Using BYOD or Self-Managed Devices

Guidance when using a "bring-your-own-device" at work, or when you manage the configuration of a computer yourself.