A security manager received reports of several laptops containing confidential data stolen out of a lab
environment. The lab is not a high security area and is secured with physical key locks. The security manager
has no information to provide investigators related to who may have stolen the laptops. Which of the following
should the security manager implement to improve legal and criminal investigations in the future?
Mobile device management