User guide

Securing devices in your
organization’s environment for
personal use and work use
Your organization might want to permit BlackBerry device users to use BlackBerry devices for both personal use and work
use. For example, your organization might want to permit users to activate personal devices on a BlackBerry Enterprise
Server or permit users to use devices that your organization purchases for personal use.
If devices are running a BlackBerry Device Software version that can distinguish between personal data and work data,
security features and options on the devices allow the devices to treat your organization’s data and applications differently
from personal data and applications. The features and options have the following benefits:
permit your organization to control access to your organization’s data and applications on the devices
help prevent your organization’s data from being compromised
provide a unified experience for users when they access personal data and work data
permit your organization to delete your organization’s data and applications from personal devices when users are no
longer a part of your organization
How a device classifies what data and
applications are for work use or personal
use
To control what happens to your organization’s data and applications on a BlackBerry device, you can configure a device to
distinguish between data and applications that are for personal use and data and applications that are for work use. You
must set the Enable Separation of Work Content IT policy rule to Yes before the device can distinguish between work data
and personal data.
By default, after you configure the Enable Separation of Work Content IT policy rule, core applications can access work
data, personal data, or both. For example, the email application can access both work data and personal data because a
BlackBerry device user can use the email application to manage the work email account and personal email accounts. To
determine whether a third-party application or an add-on application developed by Research In Motion can access work
7
Security Technical Overview Securing devices in your organization’s environment for personal use and work use
54