Answer:
1)Implementing a process to copyright or trademark your business and its work
2) Verify appropriate use of copyright, trademark, and patents.
3) Plan and document network security measures for Internet and mobile systems. Engage consultants to test system vulnerabilities.
4) Perform regular backups of computer data
5) Establish a database system containing every customer, and others with whom you have a commercial relationship with.
Author:
buddyilhs
Rate an answer:
5