True/False
A policy should be "signed into law" by a high-level manager before the collection and review of employee input.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q30: The three types of information security policies
Q31: _ are used to create procedures.<br>A) Guidelines<br>B)
Q32: When more than two audiences are to
Q33: According to Confucius,"Tell me,and I forget; show
Q34: A(n)_ screen is an acknowledgment screen that
Q36: Information security is defined in the _
Q37: Access control lists can be used to
Q38: A risk assessment is performed during the
Q39: Policies must also specify the penalties for
Q40: Typically,the information security policy administrator is _.<br>A)