54.0k views
2 votes
Technology is the tool, but without proper IG policies and a culture of compliance that supports the knowledge workers following IG policies, any effort to secure confidential information assets will fail. Why is that? With an old IT adage in mind, even a perfect IT program ..............................?

A.Will succeed without user commitmentB.Will fail without user commitmentC.Will be competitive with user commitmentD.Will loose future competitiveness without user commitment

1 Answer

0 votes

Answer:

The answer is letter B. Will fail without user commitment

Step-by-step explanation:

With an old IT adage in mind, even a perfect IT program Will fail without user commitment. Because the glaring vulnerability in the security architeture of ECM systems is that few protections exist once the information is legitimately accessed. These confidential information often can be printed, e-mailed, or faxed to unauthorized parties without any security attached.

User Aqil
by
5.7k points