Instant messaging:
Indentify the threats to IM use that the enterprise must defend against to keep their information assets secure. Then, taking into account the best practices for IM use and current technologies available to monitor IM activity, identify the policies, controls, and security measures that you would put into place if you were implementing an IM program for an organization to keep information assets secure and to prevent e-document and data loss.
You must support your work with at least four credible sources. Two of the four must be academic, peer-reviewed sources.