In designing a proprietary information protection program, the area of greatest vulnerability is:
A . Personnel files
B . Employees
C . Computers
D . Marketing data
E . Perimeter boundaries
Answer: B
In designing a proprietary information protection program, the area of greatest vulnerability is:
A . Personnel files
B . Employees
C . Computers
D . Marketing data
E . Perimeter boundaries
Answer: B