This website uses cookies to ensure you get the best experience on our website. Privacy Policy OK

Security Policy

| See more in Information Technology

You'll be introduced to some comprehensive security sub-policies.

TBaeten
By
Created Date 04.02.15
Last Updated 04.02.15
Viewed 39 Times
Your browser doesn't support HTML5. System.Collections.Generic.List`1[System.String] System.Collections.Generic.List`1[System.String]
submit to reddit

Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!

But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.

Download the Chakalaka mobile app here:
Topics of this game:
  • A document outlining mandatory requirements
  • This type of policy defines what actions users may perform while accessing systems. (2 words)
  • This type of policy outlines how organizations use personal information.
  • This security-related policy states how employees' IT resources are addressed. (2 words)
  • This policy addresses how passwords are created and managed. (2 words)
  • Password strength containing fewer than 12 characters and is found in a dictionary.
  • Password strength containing 15 or more characters using a mix of letters, numbers, and special characters.
  • This addresses disposal of confidential resources, equipment, records, and data. (3 words)
  • This is a written policy of conduct to guide employees in making decisions.