White Papers
White Papers
November -0001
: 0-0
Abstract
A practical guide for protecting IT assets from the largest single IT Security threat - inappropriate use of IT services, including desktops, email, internet, and business applications. You will learn why Acceptable Use Policies are important and what specific guidelines are needed in each area.
[To view this article, please download
the PDF.]
Comments
Be the first to comment on this!
Personal Subscriber? Sign In
Note: Please enter a display name. Your email address will not be publically displayed