Security Policy: Difference between revisions
Jump to navigation
Jump to search
Line 89: | Line 89: | ||
* actions to address these risks and opportunities; and | * actions to address these risks and opportunities; and | ||
* how to: (a) integrate and implement the actions into its information security management system processes; and | * how to: | ||
:(a) integrate and implement the actions into its information security management system processes; and | |||
(b) evaluate the effectiveness of these actions. | (b) evaluate the effectiveness of these actions. | ||