102
InformatIon SecurIty PolIcy DeveloPment for comPlIance
c. Deploys monitoring devices: (i) strategically within the informa-
tion system to collect organization-determined essential infor-
mation; and (ii) at ad hoc locations within the system to track
specic types of transactions of interest to the organization;
d. Heightens the level of information system monitoring activity
whenever there is an indication of increased risk to organiza-
tional operations and assets, individuals, other organizations, or
the Nation based on law enforcement information, intelligence
information, or other credible sources of information; and
e. Obt
ains legal opinion with regard to information system
monitoring activities in accordance with applicable ...