A _______ policy states that the company may access, monitor, intercept, block access, inspect, copy, disclose, use, destroy, or recover using computer forensics any data covered by this policy.

A. standard of conduct B. unlawful activity prohibited
C. company rights D. business use only

C. company rights

Computer Science & Information Technology

You might also like to view...

You can use Picture ________ to surround your picture with attractive frames, soften the edges of pictures, apply 3-D effects to pictures, and add glossy reflections below your pictures

A) Effects B) contrasts C) softening D) Styles

Computer Science & Information Technology

Excel includes a group of ________ features, which consist of tools and commands accessible from the formulas tab that help you check your worksheet for errors

Fill in the blank(s) with correct word

Computer Science & Information Technology