| http://www.w3.org/ns/prov#value | - In addition to passwords and biometric inspection, they are requiring employees to use computers or other hardware that is directly connected to a central security system--so that if they report a computer or cell phone as stolen, a security officer will immediately be able to track the device once it is turned on.
|