A marketing coordinator is trying to access a social media application on a company laptop but is getting blocked. The coordinator opens a help desk ticket to report the issue. Which of the following documents should a security analyst review to determine whether accessing social media applications on a company device is permitted?
shady23
1 year, 2 months agocyberPunk28
1 year, 6 months agoApplebeesWaiter1122
1 year, 11 months agotonnage800
1 year, 7 months agoID77
1 year, 2 months agoGamsje
1 year, 11 months agomtnews
1 year, 11 months ago