_____ defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet, and specifies consequences for noncompliance.
a) Encryption Policy
b) Acceptable Use Policy (AUP)
c) Privacy Policy
d) Security Policy