Cybersecurity Awareness: The Protection and Destruction of Portable Data

Cybersecurity Awareness: The Protection and Destruction of Portable Data

Streaming Video - 2017
Rate this:
Learn about the protection and destruction of portable data, and discover how to design and implement your own data management plan.
Our valued, portable data assets benefit from intentional scrutiny and governance guidelines about how each should be preserved, protected, and destroyed. This course is for anyone who has data assets that are not contained in a locked file cabinet. It may also have relevance to those who have hard copy documents, but who have not considered how those documents should be managed. Here, learn about the different states of data, and how individuals and organizations can protect their portable data that's at risk. Upon completing this course, you'll have the knowledge you need to design and implement your own data management plan. This course was created and produced by Mentor Source, Inc. We are pleased to host this training in our library.
Publisher: Carpenteria, CA : lynda.com, 2017
Branch Call Number: Internet Access
Additional Contributors: lynda.com (Firm)

Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age Suitability

Add Age Suitability

There are no age suitabilities for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number

Recommendations

Subject Headings

  Loading...

Find it at EPL

  Loading...
[]
[]
To Top