• Balance risk and rewards.
• Notify all stakeholders of
anticipated usage.
• Engage with business teams early.
• Gather all stakeholders to ensure engagement
and thorough planning.
• Look for points of integration with existing
security and operational protections.
• Examine and document information that is
collected and transmitted by devices to analyze
possible privacy impacts.
• Discuss with relevant stakeholders when, how
and with whom that information will be shared
and under what circumstances.