There are several steps in Information Risks planning. How can you utilize these steps to create a “Security Data Policy for employees

There are several steps in Information Risks planning. How can you utilize these steps to create a “Security Data Policy for employees

Topic: Information Governance

Question:

There are several steps in Information Risks planning. How can you utilize these steps to create a “Security Data Policy for employees storing personal data on their work computers.” Describe how you will use each step. Will you need to use all the steps, if not what steps would be eliminated and why?

Instructions:

  • Minimum 200 words.
  • At least one scholarly source (reference)
  • Need 2 APA References
  • Textbook attached
  • Single space.
  • No Plagiarism please.

Answer preview for There are several steps in Information Risks planning. How can you utilize these steps to create a “Security Data Policy for employees

Step
APA

478 Words