Mechanisms exist to associate cybersecurity and data protection attributes to information.
Does the organization associate cybersecurity and data protection attributes to information?
- wordsmithed control