A marketing coordinator is trying to access a social media application on a company laptop but is getting blocked. The coordinator opens a help desk ticket to report the issue. Which of the following documents should a security analyst review to determine whether accessing social media applications on a company device is permitted?
shady23
3 weeks, 1 day agocyberPunk28
5 months agoApplebeesWaiter1122
10 months agotonnage800
6 months agoID77
1 month, 2 weeks agoGamsje
10 months agomtnews
10 months, 2 weeks ago