Three key aspects need to be addressed when deploying BYOD policies in an organization: [1] what device capabilities are required for access, [2] what information different employee roles can access, and [3] what environments pose too much risk. An effective BYOD strategy can help IT balance security risks with the benefits of consumerization by regaining visibility and control of corporate data on personal devices, enabling secure sharing of data, and protecting data wherever it goes. When implementing digital asset security, organizations should educate staff, review policies for creating and sharing digital content, use strong encryption for offsite sharing, and automatically enforce consistent protection policies.