A company is starting to allow employees to use their own personal without centralized management. Employees must contract IT to have their devices configured to use corporate email; access is also available to the corporate cloud-based services. Which of the following is the BEST policy to implement under these circumstances?
A. Acceptable use policy
B. Security policy
C. Group policy
D. Business Agreement policy
Answer: A. Acceptable use policy
Computer Science & Information Technology
You might also like to view...
A(n) ____________________ is out of bounds when it is not in the range of acceptable values.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The base 10 system is called the binary number system.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology