Jane, a security administrator, is reviewing the company’s official documentation to mitigate the
risk of data loss due to personally owned devices being connected to perform company related
work. Which of the following documentation should Jane MOST likely review and update?
A.
Acceptable risk
B.
Data retention policy
C.
Acceptable use policy
D.
End user license agreement