6. • Email, File Sharing, App Data Access
• Secure Application Development Guidelines
• Encryption (data at rest, data in transition, data in use)
• Local Password Protection for Accessing the Data
• Minimal Data on User’s Device
• Wipe the Data when we lose physical control
6
7. • Separating Corporate App/Data from Consumer’s
• Restricted area for corporate information
• Device Locators
• Wipe Specific Data
• Wipe Entire Device
7