This seems like a straightforward information security question. I think the key is to identify who has the ultimate responsibility for classifying information assets.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Dannette
4 months agoCarmela
4 months agoLinn
4 months agoRosita
4 months agoLashaunda
5 months agoGladys
5 months agoHubert
5 months agoGianna
5 months agoRaina
5 months agoRosann
5 months agoFranchesca
5 months ago