I should report any policy violations,
destruction of data/information or equipment, and other security
problems to the IT Help Desk.
All users are expected to
act in a responsible, ethical, and lawful manner when accessing
the college’s information technology resources. The college’s
information technology resources are provided for use in
conducting authorized college business. Using these resources
for persona gain, illegal, or obscene activities is prohibited.
Which is the best way to protect the
sensitive data in your computer when you step away from your
a. Lock your computer with password
b. Turn off
c. Place a blanket over the screen