A :
...................................................................................................29
management systems – Requirements (second edition), ISO/IEC
27001:2013
Information technology – Security techniques – Code of practice
for
information security controls (second edition), ISO/IEC
27002:2013
Information technology – Security techniques – Governance of
information
security, ISO/IEC 27014:2013
27040:2015
4
B
4.2.1
2 Bring your own device Security and risk consideration for your
mobile device program
http://www.ey.com/Publication/vwLUAssets/EY_-
_Bring_your_own_device:_mobile_security_and_risk/$FILE/Bring_your_own_device.pdf