find out more What actions do you're taking to prevent unauthorized usage of my intelligent business card information and facts? We implement stringent entry controls and authentication mechanisms to avoid unauthorized entry. Only approved personnel have usage of sensitive details. Does the cellular application involve an internet connection to cr