⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 insert.out

📁 derby database source code.good for you.
💻 OUT
📖 第 1 页 / 共 5 页
字号:
( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of corporate assets.  Failure to include this policy statement may lead to the unauthorized use of company resources and eliminate the company''s ability to take disciplinary actions against users who abuse company assets.',null,1,1,null,null,1),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 102,1,null,'Any personal information placed on %%short_company_name%% information system resources becomes the property of %%short_company_name%%.','This is a specific and clear statement about who owns information residing on corporate assets.  Failure to include this statement would lead to confusion over ownership of information residing on corporate assets and would reduce the ability to recover and/or use such information.',null,1,2,null,null,2),( 103,1,null,'Any attempt to circumvent %%short_company_name%% security policy statements and procedures (i.e., disconnecting or tunneling a protocol through a firewall) is strictly prohibited.','All security policy statements will be followed, and attempts to circumvent them will not be tolerated.  Failure to include this policy statement may lead users to incorrectly believe that they can circumvent policies.',null,1,3,null,null,3),( 101,1,null,'All information systems within %%short_company_name%% are the property of %%short_company_name%% and will be used in compliance with %%short_company_name%% policy statements.','This is a specific and clear statement about ownership of c

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -