From Voice Video Policy Security Technical Implementation Guide
Part of SRG-POL-300605
Associated with: CCI-001639
Organizations consider rules of behavior based on individual user roles and responsibilities. Rules of behavior for both organizational and non-organizational users are essential for general unclassified communications and other specific or classified communications, which may require restrictions for those who may participate. The signed acknowledgment (user agreement) may be satisfied by the security awareness training and role-based security training programs conducted by organizations if such training includes rules of behavior.
Review the organizational Voice Video training plan. Verify the plan includes training for users on sharing control of their PC or applications with other users they are familiar with and who are identifiable as trustworthy. If the organizational Voice Video training plan does not include training materials for users on sharing control of their PC or applications with other users they are familiar with and who are identifiable as trustworthy, this is a finding.
Document in the organizational Voice Video training plan training material regarding users sharing control of their PC or applications with other users they are familiar with and who are identifiable as trustworthy.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer