Mechanisms exist to control authorized wireless usage and monitor for unauthorized wireless access.
Does the organization control authorized wireless usage and monitor for unauthorized wireless access?