What is a data breach
any form of attack where secured data is taken and or destroyed
What is an acceptable use policy
Defines what is and what is not acceptable to do on an organizations computing device
What is the network access policy
Defines who may access the network, how they may access the network, and what they can access