A software developer places a copy of the source code for a sensitive internal application on a company laptop
to work remotely. Which of the following policies is MOST likely being violated?
A.
Clean desk
B.
Data handling
C.
Chain of custody
D.
Social media