Write a 5-6 page academic paper that first identifies the threats to IM use that the enterprise must defend against to keep their information assets secure. Then, taking into account the best practices for IM use and current technologies available to monitor IM activity, identify the policies, controls, and security measures that you would put into place if you were implementing an IM program for an organization to keep information assets secure and to prevent e-document and data loss.
You must support your work with at least four credible sources. Two of the four must be academic, peer-reviewed sources.
You must use proper APA formatting, which includes a cover page, abstract, and reference page. There is an APA Guidance folder under the Content tab that contains excellent information and links for APA formatting guidelines to include a template that you can use as a go-by to get you started.
**Critical ** Plagiarism will not be tolerated. You must also ensure that you properly, paraphrase, cite and reference your sources following proper APA guidelines.