rules: policy enforcement, password expiration, and password complexity
Tips: use a unique password pattern. and expand instead of using just letters
the practice of illegally copying and selling digital music ,video,computer, software,etc.
the use of electronic communication to bully someone, typically by sending messages of an intimidating or threatening nature.