Make data and documents available and accessible 24/7 while simultaneously restricting access
Implement and enforce procedures and acceptable use policies (AUPs) for data, networks, hardware, and software that are company-owned or employee-owned as discussed in the opening case
Promote secure and legal sharing of information among authorized persons and partners
Insure compliance with government regulations and laws
Prevent attacks by having network intrusion defenses in place
Detect, diagnose, and respond to incidents and attacks in real time
Maintain internal controls to prevent unauthorized alteration of data and records
Recover from business disasters and disruptions quickly