Select the document that is MOST LIKELY to contain direction covering the security and utilisation of all an organisation's information and IT equipment, as well as email, internet and telephony.
When considering the disposal of confidential data, equipment and storage devices, what social engineering technique SHOULD always be taken into consideration?