A marketing coordinator is trying to access a social media application on a company laptop but is getting blocked. The coordinator opens a help desk ticket to report the issue. Which of the following documents should a security analyst review to determine whether accessing social media applications on a company device is permitted?
shady23
1 year agocyberPunk28
1 year, 4 months agoApplebeesWaiter1122
1 year, 9 months agotonnage800
1 year, 5 months agoID77
1 year agoGamsje
1 year, 9 months agomtnews
1 year, 9 months ago