A company is starting to allow employees to use their own personal without centralized management. Employees must contract IT to have their devices configured to use corporate email; access is also available to the corporate cloud-based services. Which of the following is the BEST policy to implement under these circumstances?

A. Acceptable use policy
B. Security policy
C. Group policy
D. Business Agreement policy

Answer: A. Acceptable use policy

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ is out of bounds when it is not in the range of acceptable values.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The base 10 system is called the binary number system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology