A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or recover using computer forensics any data covered by this policy.
A. standard of conduct B. unlawful activity prohibited
C. company rights D. business use only
C. company rights
Computer Science & Information Technology
You might also like to view...
You can use Picture ________ to surround your picture with attractive frames, soften the edges of pictures, apply 3-D effects to pictures, and add glossy reflections below your pictures
A) Effects B) contrasts C) softening D) Styles
Computer Science & Information Technology
Excel includes a group of ________ features, which consist of tools and commands accessible from the formulas tab that help you check your worksheet for errors
Fill in the blank(s) with correct word
Computer Science & Information Technology