Using the list below, identify each item in the list.
Employee training problems
Employee/company operating process and procedure problems
Need for client security procedures
Need for a password policy for clients
Need for a better password policy for employees
Need for a data retention policy
Need for a data access policy
Need for Intrusion detection/prevention measures