A software developer places a copy of the source code for a sensitive internal application on a company
laptop to work remotely. Which of the following policies is MOST likely being violated?

A.
Clean desk
B.
Data handling
C.
Chain of custody
D.
Social media
why doesn’t it fall under clean desk policy?
0
0