Which of the following is a risk of implementing a BYOD policy?