Which of the following should be made part of a proprietary information protection program?
In designing a proprietary information protection program, the area of greatest vulnerability is:
In devising proprietary information procedures, which of the following is considered to be a main area of paper or document vulnerability?
When a loss of proprietary information is discovered, which of the following steps should be taken first?
Which of the following would not be considered in the "trade secret" category?
Which of the following is not a legitimate purpose of an investigation for employee misconduct?