This document discusses the advantages and disadvantages of BYOD (bring your own device) policies as they relate to mobile device management and securing confidential company data. It asks the reader to discuss these topics from their own professional experience, or if no experience, to base the discussion on research and include citations.