photo.jpg
Transcript
# Security Rule enforcement - Secure internet connections - Access control using passwords - Back-up systems - Security policies for violations
# Security Rule enforcement - Secure internet connections - Access control using passwords - Back-up systems - Security policies for violations