There are separate instructions for staff to use mobile devices. The instructions cover:
Unmanaged installations of software on computers can lead to vulnerabilities and security breaches.
The organization should determine what types of software or updates each user can install. The instructions may include e.g. the following guidelines:
Our organization has defined policies in place to prevent or at least detect the use of unauthorized programs.