"Organizations should have policies regarding the use of tethering. If an organization permits tethering, then it should ensure that the network connections involving tethering are strongly protected (e.g., communications encryption). If an organization prohibits tethering, then it should configure mobile devices so that they cannot be used for tethering."
- ↑ NIST Special Publication 800-124r1, at 5.
- ↑ Guidelines on the Implementation by National Regulators of European Net Neutrality Rules, at 9 n.9.
- ↑ Id. at 5 n.4.