What type of information security policy document should define the procedures users should follow if they suspect misuse of corporate computing resources by an employee or other affiliate?

What type of information security policy document should define the procedures users should follow if they suspect misuse of corporate computing resources by an employee or other affiliate?


a. Backup policy
b. Data retention policy
c. Acceptable use policy
d. Confidentiality policy


Answer: c. Acceptable use policy


Learn More :

Network Security

Learn More Multiple Choice Question :