Which of the following requires special handling and explicit policies for data retention and data distribution?
A.
Personally identifiable information
B.
Phishing attacks
C.
Zero day exploits
D.
Personal electronic devices
Which of the following requires special handling and explicit policies for data retention and data distribution?
Which of the following requires special handling and explicit policies for data retention and data distribution?
A.
Personally identifiable information
B.
Phishing attacks
C.
Zero day exploits
D.
Personal electronic devices