A marketing coordinator is trying to access a social media application on a company laptop but is getting blocked. The coordinator opens a help desk ticket to report the issue. Which of the following documents should a security analyst review to determine whether accessing social media applications on a company device is permitted?
shady23
1 week, 4 days agocyberPunk28
4 months, 3 weeks agoApplebeesWaiter1122
9 months, 3 weeks agotonnage800
5 months, 3 weeks agoID77
1 month agoGamsje
9 months, 3 weeks agomtnews
10 months ago