All of these actions must be balanced against the increased risk to information security, particularly as it relates to cloud computing and mobile technologies.
Students hanging out in the lounge balance portable computing devices on their laps, and one student climbing stairs is intently focusing on a laptop balanced in her palm.