1. Differentiate between a security policy and an acceptable use policy. Be sure to provide examples of what each might contain.
2. Discuss what you think might happen when we negotiate via email instead of face-to-face? Some examples that readily come to mind are job negotiations, negotiating with a craigslist poster or even a real estate negotiation through an agent (strictly not computer, I know)...let your ideas flow...
would you please explain it.