Answer:
The answer is letter B. Will fail without user commitment
Step-by-step explanation:
With an old IT adage in mind, even a perfect IT program Will fail without user commitment. Because the glaring vulnerability in the security architeture of ECM systems is that few protections exist once the information is legitimately accessed. These confidential information often can be printed, e-mailed, or faxed to unauthorized parties without any security attached.