An organization allows employees to use personally owned mobile devices to access customers’ personal information.
An IS auditor’s GREATEST concern should be whether:
A . mobile devices are compatible with company infrastructure.
B . devices have the capability to segregate business and personal data.
C . mobile device security policies have been implemented.
D . devices have adequate storage and backup capabilities.
Answer: C