Create formal usage policies and processes. Just because IT is getting out of the business of supporting phones doesn't mean you can abdicate responsibility for protecting corporate data. To enable BYOD, you have to determine which applications you will support on employee-owned devices, and you need to establish policies allowing IT to remotely wipe data, even personal media, if a phone is lost or stolen. Consider as well the use of mobile device management (MDM) software to encrypt and protect corporate data.
Communicate and train. While plenty of users will be jacked about using their own phone at work and getting a stipend to defray the cost, there will be others who see the move to BYOD as a hassle and lost perk. Consistent communication about the policies, especially around support, is essential as is walking users through any additional security measures.
Longtime contributor Beth Stackpole last wrote for Computerworld on IT execs learning to let go of their 'command and control' mindset .
Read more about mobile and wireless in Computerworld's Mobile and Wireless Topic Center.