Question: 1 . Comment: 2 . Can you identify the legislation and tell us about them, as per the question requirement explain the Australian legislation associated
Comment:
Can you identify the legislation and tell us about them, as per the question requirement "explain the Australian legislation associated with data protection
Comment:
can you be more specific:
What are the laws that were breached?
What are the legal issuesconsequences of having a data breach?
Comment:
For the NZ Crimes Act of are you able to research and identify how it is associated with Cyber Security, consider reviewing what it states for Cybercrime offences.
Comment:
For the Bring Your OWN Device Policy, what is it what should it cover?
Also, Data management policy, why is it needed what should it cover?
Comment:
Part is asking about risks a risk is an area where if exploited, it could be leveraged by a cyberattack" a risk is the potential for something to occur
so in the example of Data breach, the risk will be Data theft
Please update part
Comment:
I am not sure how Number fits into Training. Consider what information you might provide them and equip them with to train them or keep them informed.
Comment:
In this question we are looking for Practices, invest in security systems is not a practice an organisation might look to implement.
Comment:
please read over your answers, could or do you mean cloud?
also when you state poor cyber hygiene, what is the threat?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
