Watch this video on YouTube
What is the primary concern and goal of an information security manager to focus on regarding a business partner who has remote read-only access to material inventory?