When should a company develop a vender Information Security Policy?_ Give one example for the different Risk Mitigation techniques?

Q1- Give one example for the different Risk Mitigation techniques?(Governance and Risk Management)

Q2- When should a company develop a vender Information Security Policy?( Governance and Risk Management)

Q3- Some positions within a company require more detailed background checks than others. Provide an example of a high risk position within a company, and provide an example of a low risk position within a company. Why does the high risk position require a more detailed background check?( Human Resources Security)

Q4- Select a company/organization of your choice. Refer their website and identify what sort of privacy policy they use, regarding the employee data. (Human Resources Security)

 

Please follow and like us: