Enterprises—and possibly people, in general—have reached a point of device overload. It’s not uncommon to find out that most U.S. professionals use at least three devices (for instance, laptops, smartphones and tablets) in their daily routines. Watches and other wearables, not to mention connected cars, also are working their way into our lives. Some devices, such as PCs, are well understood and have mature controls. Others, such as smartphones, tablets and phablets, still have some untested controls—or controls that people don’t use—because they’re not trained on them. Of course, human error can happen at any time. All devices are vulnerable, and most fail at some point in the hands of those who control them. Instead of defining a multitude of specific policies for the Internet, bring your own device (BYOD), file sharing, collaboration, storage and so on, we offer in this eWEEK slide show a list of eight policy suggestions that can serve as a basis to govern the human endpoint. By this, we mean how humans interact with any IT endpoint device.