Discussion
Using a Web browser, search for any information security policies used at your academic institution. Compare them to the ones discussed in this chapter, are there sections missing? if so, which ones?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.