Review new technology that is being planned for deployment. Identify areas in which the security policy should change.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.