1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnoma [55]
3 years ago
7

If you were the manager at a firm which deals with sensitive information of its customers, employees and other stake holders, ho

w would you make sure that information is protected and is altered only by the designated authorized person
Computers and Technology
1 answer:
Rzqust [24]3 years ago
5 0

Answer:

explanation below

Explanation:

Management controls are some of the techniques and mechanisms that can be put in place to implement security policies – which ensure information and information systems are protected.  These controls are not only used by managers but can be exercised by selected users.  

These controls must be put in place to cover all forms of information security, physical security and classification of those information.  

You might be interested in
Waterpower was first harvested by ancient societies using
Maslowich
Not sure why this question is in Computers and Technology...

Answer should be c.
6 0
3 years ago
What are the three main elements common to all radio ads?
Mama L [17]
Answer: final notions on frequency, reach, and consistency.



If my answers wrong please tell me :D
5 0
3 years ago
Read 2 more answers
If your network subnet mask is /16, what is the maximum number of host ids available for this network?
kupik [55]
65534






-------------------------------------------
8 0
3 years ago
Which of these is a valid use of the Reply All feature?
zalisa [80]

Answer:

I think is None of this ,

6 0
3 years ago
For electronically deposited funds, such as an employee's direct deposit, when must banks make those funds available to the empl
Kazeer [188]
I'm in computers class and I would say
6 0
3 years ago
Other questions:
  • A(n ____ enables a database administrator to define schema components.
    10·1 answer
  • 2.2-2 Consider sorting numbers stored in array by first finding the smallest element n A of and exchanging it with the element i
    11·1 answer
  • Which of the following variable names is not valid? 1price 1 price price 1 price1
    15·2 answers
  • Universal Containers uses a custom field on the account object to capture the account credit status. The sales team wants to dis
    7·1 answer
  • Do you think that distributed OSs use a process-communication technique different from that used by desktop OSs?
    13·1 answer
  • How do I type the integral symbol?
    6·1 answer
  • The Operating System is used to locate, move, and copy files.
    10·1 answer
  • One problem with _______ is that often many copies of the same document are made. <br><br>HELPPP ​
    11·1 answer
  • I don't get the width and height part (PLEASE HELP WILL GIVE BRAINLIEST ANSWER)
    12·1 answer
  • Which actions represent parody?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!