4 Discussions 1 Page Each

profileShrikaa

Discussion 6.1


What are shrinkwrap, clickwrap, and browsewrap agreements?  Why are they used and can you provide examples of each?  


Discussion 6.2


Why would you include an information security provision in a contract? 


Discussion 7.1


List and explain several types of policies that can be used to govern information security.  


Discussion 7.2


Briefly describe the risk assessment process?  What are the steps to handling risks?  Feel free to provide your own example of how you have handled risk situations that you've had to deal with.  



    • 4 years ago
    • 10
    Answer(2)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      Discussions.doc

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      Shrink.docx
    • attachment
      PoliciesinInformationSecurit1.docx
    • attachment
      PoliciesinInformationSecurity.docx
    • attachment
      RiskAssessmentProcedures.docx