Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?

Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?

How diligent are you in keeping your own information secure? Review the steps listed in the chapter and comment on your security status.