{"id":911,"date":"2015-06-25T04:05:19","date_gmt":"2015-06-24T22:35:19","guid":{"rendered":"https:\/\/www.invensislearning.com\/blog\/?p=911"},"modified":"2026-04-06T11:48:03","modified_gmt":"2026-04-06T06:18:03","slug":"how-itil-helps-your-byod-strategy","status":"publish","type":"post","link":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/","title":{"rendered":"Enhance Your BYOD Strategy Using ITIL Framework"},"content":{"rendered":"<p>Mobile devices and tablets are transforming the way employees work and how IT supports them. The BYOD (Bring-Your-Own-Device) strategy has several benefits to your organization and end-users, especially the cost-cutting in terms of procuring new devices for your staff. Furthermore, it is a well-known fact that individuals are at their best efficiency when they work on their own devices and technology. This trend towards mobility stems from the increasing awareness of cloud computing. A Gartner research estimates that by 2020, 85% of companies will adopt some form of the BYOD program.<\/p>\n<h2><strong>Using ITIL to Help your BYOD Strategy<\/strong><\/h2>\n<p>Managing a mobile workforce that has company-issued devices is much simpler in terms of security and compliance. The BYOD concept brings with it an increased vulnerability to security issues and consequential business risks.<\/p>\n<p>BYOD poses 3 key challenges to business, for which ITIL offers solutions:<\/p>\n<h3><strong>1. Information Security:<\/strong><\/h3>\n<p>Today, many handheld devices such as mobile phones, tablets, and personal laptops pose a huge threat when it comes to information security and accessibility. A mobile device can easily be lost or stolen. Recent research shows that nearly 113 mobile phones are lost or stolen every minute in the US. Additionally, an employee might leave the company or change departments, and there may be no way to ensure that the device does not retain sensitive passwords. Furthermore, it will be difficult to manage the software that is installed on the device; the employee will still have access to confidential information and the network. This information could land up in competitors\u2019 hands or any other illegal or unethical organizations.<\/p>\n<h3><strong>ITIL recommendation:<\/strong><\/h3>\n<p>ITIL recommends a corporate policy or IT policy as to what information can be stored on a local device, including making all networks password protected and configuring the devices such that information can be locked or wiped if the device is lost or stolen.<strong><br \/>\n<\/strong><\/p>\n<h3><strong>2. Compatibility:<\/strong><\/h3>\n<p>Different users are going to be using different devices and platforms. This is going to complicate the IT department\u2019s work. Your sales department might be having a mobile staff and all of them may be using their own devices with different platforms.<\/p>\n<h3><strong>ITIL Recommendation:<\/strong><\/h3>\n<p>The cost to support the BYOD strategy could be passed on to the user. The IT department can provide the business with two choices. First, they can build the applications your employees need to use on their devices if you can limit the number of devices used by the workforce. If the cost is passed on to the user, then limiting the number of devices may not be needed. Second, IT can build different platforms for devices to use, while the number of applications can be limited.<\/p>\n<h3><strong>3. Governance and Compliance:<\/strong><\/h3>\n<p>This is another serious issue caused by BYOD. Employees could gain access to unsecured networks and software that has not been approved by IT, which could compromise security and in turn impact the productivity of the organization. The cost savings you had managed through BYOD might be overturned by these complications. Without an air-tight governance policy, you will not be able to avoid any rule violations and theft of intellectual property.<\/p>\n<h3><strong>ITIL Recommendation:<\/strong><\/h3>\n<p>ITIL recommends a comprehensive governance policy \u2013 for both internal and external governance. Access management is a critical component of this policy. Employees need to be educated about the policy and their feedback needs to be incorporated. Consultation with HR and legal teams is also essential to devise a secure governance policy that will complement your BYOD strategy.<\/p>\n<p>Today CEOs and CIOs realize that there can be a middle ground where you can give your employees enough freedom to innovate and work with flexibility, and also have control over security and governance to protect confidential information, especially in the case of highly secure environments such as financial organizations.<\/p>\n<p>BYOD is a technology shift that could benefit companies in terms of long-term profitability, while <a title=\"A PEOPLECERT accredited ITSM training organization imparting ITSM related courses such as ITIL Foundation, ITIL Intermediate Lifecycle and ITIL Intermediate Capability modules and ITIL MALC. \" href=\"https:\/\/www.invensislearning.com\/itsm-certification-courses\/\" target=\"_blank\" rel=\"noopener noreferrer\">ITIL<\/a> can help you to keep it on a leash and ensure your organization and its information is secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile devices and tablets are transforming the way employees work and how IT supports them. The BYOD (Bring-Your-Own-Device) strategy has several benefits to your organization and end-users, especially the cost-cutting in terms of procuring new devices for your staff. Furthermore, it is a well-known fact that individuals are at their best efficiency when they work [&hellip;]<\/p>\n","protected":false},"author":36,"featured_media":7135,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v16.7 (Yoast SEO v16.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Optimize Your BYOD Strategy with ITIL<\/title>\n<meta name=\"description\" content=\"Discover how ITIL can strengthen your Bring Your Own Device (BYOD) strategy, ensuring security, compliance, and effective management.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhance Your BYOD Strategy Using ITIL Framework\" \/>\n<meta property=\"og:description\" content=\"Discover how ITIL can strengthen your Bring Your Own Device (BYOD) strategy, ensuring security, compliance, and effective management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Invensis Learning Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/invensislearn\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-24T22:35:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-06T06:18:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/banner-image-How-ITIL-Helps-your-BYOD-Strategy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@InvensisElearn\" \/>\n<meta name=\"twitter:site\" content=\"@InvensisElearn\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristine Angela Millano\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\",\"name\":\"Invensis Learning\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/invensislearn\/\",\"https:\/\/www.instagram.com\/invensis_learn\/\",\"https:\/\/www.linkedin.com\/company\/invensis-learning\/\",\"https:\/\/www.youtube.com\/channel\/UCq4xOlJ4xz6Fw7WcbFkrsUQ\",\"https:\/\/twitter.com\/InvensisElearn\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png\",\"contentUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png\",\"width\":181,\"height\":47,\"caption\":\"Invensis Learning\"},\"image\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#website\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/\",\"name\":\"Invensis Learning Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.invensislearning.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/banner-image-How-ITIL-Helps-your-BYOD-Strategy.jpg\",\"contentUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/banner-image-How-ITIL-Helps-your-BYOD-Strategy.jpg\",\"width\":696,\"height\":360,\"caption\":\"How ITIL Helps your BYOD Strategy\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#webpage\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/\",\"name\":\"Optimize Your BYOD Strategy with ITIL\",\"isPartOf\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#primaryimage\"},\"datePublished\":\"2015-06-24T22:35:19+00:00\",\"dateModified\":\"2026-04-06T06:18:03+00:00\",\"description\":\"Discover how ITIL can strengthen your Bring Your Own Device (BYOD) strategy, ensuring security, compliance, and effective management.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Enhance Your BYOD Strategy Using ITIL Framework\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5\"},\"headline\":\"Enhance Your BYOD Strategy Using ITIL Framework\",\"datePublished\":\"2015-06-24T22:35:19+00:00\",\"dateModified\":\"2026-04-06T06:18:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#webpage\"},\"wordCount\":662,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/banner-image-How-ITIL-Helps-your-BYOD-Strategy.jpg\",\"articleSection\":[\"Latest IT Service Management Blogs\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5\",\"name\":\"Kristine Angela Millano\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.invensislearning.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png\",\"contentUrl\":\"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png\",\"caption\":\"Kristine Angela Millano\"},\"description\":\"Kristine Angela Millano is a professional with experience in digital operations, data processes, and technology-driven workflows. She specializes in structured problem-solving and quality evaluation, contributing to improved operational performance and data-driven decision-making. At Invensis Learning, she develops content focused on practical learning and real-world application of technology and process improvement.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/kristine-angela-millano\/\"],\"url\":\"https:\/\/www.invensislearning.com\/blog\/author\/kristine-angela-millano\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Optimize Your BYOD Strategy with ITIL","description":"Discover how ITIL can strengthen your Bring Your Own Device (BYOD) strategy, ensuring security, compliance, and effective management.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Enhance Your BYOD Strategy Using ITIL Framework","og_description":"Discover how ITIL can strengthen your Bring Your Own Device (BYOD) strategy, ensuring security, compliance, and effective management.","og_url":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/","og_site_name":"Invensis Learning Blog","article_publisher":"https:\/\/www.facebook.com\/invensislearn\/","article_published_time":"2015-06-24T22:35:19+00:00","article_modified_time":"2026-04-06T06:18:03+00:00","og_image":[{"width":696,"height":360,"url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/banner-image-How-ITIL-Helps-your-BYOD-Strategy.jpg","path":"\/home\/ubuntu\/dev\/blog\/invensislearning_blog\/wp-content\/uploads\/2015\/06\/banner-image-How-ITIL-Helps-your-BYOD-Strategy.jpg","size":"full","id":7135,"alt":"How ITIL Helps your BYOD Strategy","pixels":250560,"type":"image\/jpeg"}],"twitter_card":"summary","twitter_creator":"@InvensisElearn","twitter_site":"@InvensisElearn","twitter_misc":{"Written by":"Kristine Angela Millano","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.invensislearning.com\/blog\/#organization","name":"Invensis Learning","url":"https:\/\/www.invensislearning.com\/blog\/","sameAs":["https:\/\/www.facebook.com\/invensislearn\/","https:\/\/www.instagram.com\/invensis_learn\/","https:\/\/www.linkedin.com\/company\/invensis-learning\/","https:\/\/www.youtube.com\/channel\/UCq4xOlJ4xz6Fw7WcbFkrsUQ","https:\/\/twitter.com\/InvensisElearn"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.invensislearning.com\/blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png","contentUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/invensislogo-1.png","width":181,"height":47,"caption":"Invensis Learning"},"image":{"@id":"https:\/\/www.invensislearning.com\/blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.invensislearning.com\/blog\/#website","url":"https:\/\/www.invensislearning.com\/blog\/","name":"Invensis Learning Blog","description":"","publisher":{"@id":"https:\/\/www.invensislearning.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.invensislearning.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/banner-image-How-ITIL-Helps-your-BYOD-Strategy.jpg","contentUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/banner-image-How-ITIL-Helps-your-BYOD-Strategy.jpg","width":696,"height":360,"caption":"How ITIL Helps your BYOD Strategy"},{"@type":"WebPage","@id":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#webpage","url":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/","name":"Optimize Your BYOD Strategy with ITIL","isPartOf":{"@id":"https:\/\/www.invensislearning.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#primaryimage"},"datePublished":"2015-06-24T22:35:19+00:00","dateModified":"2026-04-06T06:18:03+00:00","description":"Discover how ITIL can strengthen your Bring Your Own Device (BYOD) strategy, ensuring security, compliance, and effective management.","breadcrumb":{"@id":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Enhance Your BYOD Strategy Using ITIL Framework"}]},{"@type":"Article","@id":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#article","isPartOf":{"@id":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#webpage"},"author":{"@id":"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5"},"headline":"Enhance Your BYOD Strategy Using ITIL Framework","datePublished":"2015-06-24T22:35:19+00:00","dateModified":"2026-04-06T06:18:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#webpage"},"wordCount":662,"commentCount":0,"publisher":{"@id":"https:\/\/www.invensislearning.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2015\/06\/banner-image-How-ITIL-Helps-your-BYOD-Strategy.jpg","articleSection":["Latest IT Service Management Blogs"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.invensislearning.com\/blog\/how-itil-helps-your-byod-strategy\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.invensislearning.com\/blog\/#\/schema\/person\/0ec0729ad55f1c5ec6e42a39d91d0ec5","name":"Kristine Angela Millano","image":{"@type":"ImageObject","@id":"https:\/\/www.invensislearning.com\/blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png","contentUrl":"https:\/\/www.invensislearning.com\/blog\/wp-content\/uploads\/2026\/03\/kristine-96x96.png","caption":"Kristine Angela Millano"},"description":"Kristine Angela Millano is a professional with experience in digital operations, data processes, and technology-driven workflows. She specializes in structured problem-solving and quality evaluation, contributing to improved operational performance and data-driven decision-making. At Invensis Learning, she develops content focused on practical learning and real-world application of technology and process improvement.","sameAs":["https:\/\/www.linkedin.com\/in\/kristine-angela-millano\/"],"url":"https:\/\/www.invensislearning.com\/blog\/author\/kristine-angela-millano\/"}]}},"_links":{"self":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts\/911"}],"collection":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/comments?post=911"}],"version-history":[{"count":9,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts\/911\/revisions"}],"predecessor-version":[{"id":24879,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/posts\/911\/revisions\/24879"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/media\/7135"}],"wp:attachment":[{"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/media?parent=911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.invensislearning.com\/blog\/wp-json\/wp\/v2\/categories?post=911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}