disaster recovery 53

Using a Web browser, search for any information security policies used at any academic institution. Compare them to the ones discussed in this chapter. Are there sections missing? If so, which ones?


  • Type your responses with proper headings in a word document.
  • Detailed and significant scholarly answers will be graded with full point value. Incomplete, inaccurate, or inadequate answers will receive less than full credit depending on the answers provided.
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published.