IT Policies
1. Create an outline of the policy sections for the password protection. Explain why each section is important for the policy. 2. Explain the policy hierarchy along with a description for each object. Explain how the hierarchy should be completed for an initial policy. What changes would we see if an existing policy was modified? 3. What should be included in each policy to ensure the format is consistent throughout the organization? What practices need to be put in place to ensure the format is the standard practice for the organization? 4. Why are pilot definitions an important part of any policy? Provide at least 3 definitions examples that could be included in a data breach policy