Field sales people can have a sales database on their smart phones. The sales database contains sensitive, competitive information. Using their smart phones, the salespeople can query the data, update it, delete it, and place orders. This application uses both warehouse and operational data.
In this Discussion, propose a strategy to make the data available and secure. Recommend a method of access control and integrity control, and defend your choices.