Physical security mechanisms exist to restrict access to printers and other system output devices to prevent unauthorized individuals from obtaining the output.
Does the organization restrict access to printers and other system output devices to prevent unauthorized individuals from obtaining the output?