Security steps which need to be taken when allowing BYOD

Security steps which need to be taken when allowing BYOD