Transcript text: John works as a security manager at XYZ Inc. He has created a policy to allow employees to use their personally owned devices. He is getting reports of the company's data appearing on unapproved forums and an increase in the theft of personal electronic devices. Which of the following security controls would he implement to reduce the risk of exposure?