Discuss the unique control problems EDI creates.
1. Is backup redundancy inefficient?
2. Discuss how the widespread use of laptop and notebook computers is making data encryption standards more easily penetrable.
3. Discuss the unique control problems EDI creates.