Which of the following controls is described in the statement given below?
"It ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at."
Johnetta
3 months agoAllene
3 months agoRefugia
3 months agoGlendora
4 months agoCarlee
4 months agoJoesph
4 months agoSuzan
4 months agoEileen
4 months agoErinn
5 months agoCarmen
5 months agoArminda
5 months agoLeonora
5 months agoAnnamaria
5 months agoLeanna
5 months agoOdette
5 months agoFlo
10 months agoKatina
9 months agoWenona
9 months agoDorathy
9 months agoBulah
10 months agoAnglea
10 months agoCarlene
10 months agoAntonette
10 months agoDanilo
11 months agoOmega
11 months agoMichael
9 months agoBobbie
9 months agoBasilia
10 months agoRuth
10 months agoFrederica
11 months agoChandra
11 months agoLoise
11 months agoBettyann
11 months ago