This seems like a straightforward information security question. I think the key is to identify who has the ultimate responsibility for classifying information assets.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Dannette
6 months agoCarmela
7 months agoLinn
7 months agoRosita
7 months agoLashaunda
7 months agoGladys
7 months agoHubert
7 months agoGianna
7 months agoRaina
7 months agoRosann
7 months agoFranchesca
7 months ago