EC SECURITY POLICIES AND TRAINING
acceptable use policy (AUP)
Policy that informs users of their responsibilities when using company networks, wireless devices, customer data, and so forth
EC SECURITY PROCEDURES AND ENFORCEMENT
business impact analysis (BIA)
An exercise that determines the impact of losing the support of an EC resource to an organization and establishes the escalation of that loss over time, identifies the minimum resources needed to recover, and prioritizes the recovery of processes and supporting systems