In the context of more and more leaks, information theft is not surprising when a company wants to protect their data by strictly controlling the way the data moves. However, such strict policies also make IT department headaches because sharing software installations, drivers, firmware, patches . all use other mobile storage devices regularly.
It is not clear whether IBM's new policy is limited to any data type or completely banned.
See more: