Which of the following BEST enforces this policy in the case:
Contractors are brought in many times a year to complete inventory, and the contractors utilize computers provided by the company. According to the company's security policy, once the inventory is complete, the contractors should not be able to log in to the laptops until the next inventory.
Comments