Discussion: Security Policies
What security policies will need to be built into your company's overall existing security program to ensure that data is safeguarded, i.e., media destruction policy, incident response policy, acceptable use policy, etc.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.