Answer:
B. Information security policies
Step-by-step explanation:
Applications allowed to be placed on the corporate network, like IM software, and corporate computer equipment used for personal reason on personal networks are two areas that should be addressed by managers in information security policies.