5 Rules to Make BYOD Manageable and Secure