Sipes, Elizabeth Kemery; James, Joshua; Zetoony, David - In: Journal of Investment Compliance 17 (2016) 3, pp. 55-59
their cybersecurity programs, including document retention policies, creating incident response plans, and starting or … article identifies best practices for data security with respect to document retention policies, incident response plans and … bounty programs. Originality/value This article includes practical guidance regarding document retention policies, incident …