Personal Wireless Network (PAN) Security

1.Most people see Bluetooth as a personal wireless network (PAN). Why is this so? What standard does Bluetooth use?
2.If you are an enterprise security chief, how would you go about choosing a security best practice? Is it good security policy to always use a best security practice? What are the benefits of using a best practice?