Security Policy: Difference between revisions

Jump to navigation Jump to search
Line 89: Line 89:


* actions to address these risks and opportunities; and
* actions to address these risks and opportunities; and
* how to: (a) integrate and implement the actions into its information security management system processes; and  
* how to:
:(a) integrate and implement the actions into its information security management system processes; and  
           (b) evaluate the effectiveness of these actions.
           (b) evaluate the effectiveness of these actions.