Dell was using the cost leadership strategy but is now using differentiation leadership strategy.
#learnwithBrainly
Answer:
Following is given the solution to question I hope it will make the concept easier!
Explanation:
Answer:
(1) Protecting the privacy of personal data and proprietary information
(2) Proprietary Information
These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon
(1) Disaster Recovery Policy
(2) Acceptable Use Policy
(3) Business Continuity plan
They won’t let it be on your computer, knowing it well give you answers