I need support with this Computer Science question so I can learn better.
Complete this discussion question with a minimum of 150 words with APA scholarly sources to support your content. Make sure you respond to two other students with a minimum of 150 words each and scholarly sources.
There are several steps in Information Risks planning. How can you utilize these steps to create a “Security Data Policy for employees storing personal data on their work computers.” Describe how you will use each step. Will you need to use all the steps, if not what steps would be eliminated and why?
Please after this i will submit the two peers reviews , need to work on the responses too.
Strictly need in APA format