List the significant guidelines used in the formulation of effective information security policy.

What will be an ideal response?

For policies to be effective, they must be properly:1. Developed using industry-accepted practices2. Distributed or disseminated using all appropriate methods3. Reviewed or read by all employees4. Understood by all employees5. Formally agreed to by act or assertion6. Uniformly applied and enforced

Computer Science & Information Technology

You might also like to view...

You identify which data list values you want to include in the text box by nesting ____ elements within a element.

A. B. C.