Security Policy
You'll be introduced to some comprehensive security sub-policies.
Created Date
04.02.15
Last Updated
04.02.15
Viewed 39 Times
Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!
But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.
Download the Chakalaka mobile app here:
Topics of this game:
-
A document outlining mandatory requirements
-
This type of policy defines what actions users may perform while accessing systems. (2 words)
-
This type of policy outlines how organizations use personal information.
-
This security-related policy states how employees' IT resources are addressed. (2 words)
-
This policy addresses how passwords are created and managed. (2 words)
-
Password strength containing fewer than 12 characters and is found in a dictionary.
-
Password strength containing 15 or more characters using a mix of letters, numbers, and special characters.
-
This addresses disposal of confidential resources, equipment, records, and data. (3 words)
-
This is a written policy of conduct to guide employees in making decisions.
User comments are currently unavailable. We apologize for the inconvenience and are working to restore this feature as soon as possible.