... reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, ... USE****************************** This appendix presents information about determining threats and analyzing risks that users can introduce to a network. You will learn how to define what is considered to be an acceptable ... access to internal resources. A user may abuse access to internal resources, such as color laser printers. 3. Methods and restrictions to storing data. A user may use a network share to store...