Mechanisms exist to manage business risks associated with permitting mobile device access to organizational resources.
Does the organization manage business risks associated with permitting mobile device access to organizational resources?