• The recommendations in this course is for information purposes only.
  • Before acting on any recommendation presented in this course, independently evaluate the security, legal, technical, and reputational implications considering the unique technology configurations in each scenario.
  • In your workplace, consult your Information Security Unit before implementing any recommendation in this course.