A marketing coordinator is trying to access a social media application on a company laptop but is getting
blocked. The coordinator opens a help desk ticket to report the issue. Which of the following documents should
a security analyst review to determine whether accessing social media applications on a company device is
permitted?
A. Incident response policy
B. Business continuity policy
C. Change management policy
D. Acceptable use policy
blocked. The coordinator opens a help desk ticket to report the issue. Which of the following documents should
a security analyst review to determine whether accessing social media applications on a company device is
permitted?
A. Incident response policy
B. Business continuity policy
C. Change management policy
D. Acceptable use policy