Security Basics mailing list archives
Policy Violations
From: "John D" <tornado579 () gmail com>
Date: Mon, 4 May 2009 19:43:22 +0530
Hi All,I was just wondering about what are the best practices followed in the organiations when it comes to Policy violations. For E.g. Accessing Adult material from the company resources, engaging in malicious activities etc.
Your thoughts are welcome.Thanks in advance.
------------------------------------------------------------------------ This list is sponsored by: InfoSec InstituteLearn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------
Current thread:
- Policy Violations John D (May 04)
- Message not available
- Re: Policy Violations John D (May 05)
- Message not available
- Re: Policy Violations Stephen Mullins (May 11)
- <Possible follow-ups>
- Re: Policy Violations aaa . bbb (May 05)
- Re: Policy Violations aaa . bbb (May 05)