Assignment
Governance and Risk Management
1. Give one example for the different Risk Mitigation techniques.
2. When should a company develop a vender Information Security Policy?
Human Resources Security
3. Some positions within a company require more detailed background checks than others. Provide an example of a high risk position within a company, and provide an example of a low risk position within a company. Why does the high risk position require a more detailed background check?
4. Select a company/organization of your choice. Refer their website and identify what sort of privacy policy they use, regarding the employee data
Text Book: Security Program and Policies: Principles and Practices by Sari Stern Greene, Second Edition.