This preview shows page 1. Sign up to view the full content.
Unformatted text preview: Information Security Ensure the routine backup of files Use data only for approved company purposes Ensure security and validity of information Electronic Communications The following types of communication are prohibited: Chain letters, pyramid schemes, and unauthorized mass mailings Fraudulent, threatening, defamatory, obscene, harassing, or illegal materials Non-work or non-class related information sent to an individual who requests the information not be sent Copyright law violation Commercial or personal advertisements, solicitations, destructive programs, or any other unauthorized use...
View Full Document
- Spring '11