Mechanisms exist to identify and explicitly authorize users who are allowed to independently configure wireless networking capabilities.
Does the organization identify and explicitly authorize users who are allowed to independently configure wireless networking capabilities?