Which of the following would BEST prevent the potential leakage of sensitive corporate data from personal mobile devices accessing corporate applications?
A. Limiting access and capabilities when connecting to the Internet
B. Creating a separate secure partition on the devices
C. Monitoring employee connections to the corporate network
D. Requiring employees to sign acknowledgment of an acceptable use policy