CMGT 400 Week 3 DQ 2 How can a company protect data on corporate laptops according to the Storn (2008) article? Why do more organizations not use this kind of protection? Do you expect this to become a legal requirement in the future? Explain why or why not. Check this A+ tutorial guideline at /CMGT-400/CMGT-400-Week-3- DQ-2 For more classes visit