LO1 | Summarize the guidelines for creating an information privacy policy. |
LO2 | Identify the differences between an ethical computer use policy and an acceptable use policy. |
LO3 | Describe the relationship between an email privacy policy and an Internet use policy. |
LO4 | Explain the effects of spam on an organization. |
LO5 | Summarize the different monitoring technologies and explain the importance of an employee monitoring policy. |