Attachments: CMGT 400 Week 3 DQ 2 (UOP Course).doc [ Preview Here ]
How can a company protect data on corporate laptops according to the Storn (2008) article? Why do more organizations not use this kind of protection? Do you expect this to become a legal requirement in the future? Explain why or why not.