employee handbook 3

https://www.veracode.com/sites/default/files/Resources/Whitepapers/cybersecurity-in-the-boardroom-whitepaper.pdf

https://www.oceg.org/about/what-is-grc/

http://www.isaca.org/knowledge-center/research/documents/information-security-govenance-for-board-of-directors-and-executive-management_res_eng_0510.pdf

https://www.csoonline.com/article/2124114/it-strategy/strategic-planning-erm-how-to-write-an-information-security-policy

.html

https://trustedcomputinggroup.org/wp-content/uploads/us-cio-council-byod-toolkit-20120829.pdf

https://www.epa.gov/sites/production/files/documents/sanitization_sample.pdf

https://www.michigan.gov/documents/msp/Media_Sanitization_Destruction_Policy_442249_7.pdf

https://www.whitehouse.gov/sites/whitehouse.gov/files/omb/memoranda/2016/m-16-04.pdf

https://www.opm.gov/blogs/Director/cybersecurity-national-action-plan/

https://www.hsdl.org/?view&did=791802

https://www.hsdl.org/?collection&id=2724

https://www.americanbar.org/content/dam/aba/events/labor_law/2015/march/tech/wu_cybersecurity.authcheckdam.pdf

https://www.americanbar.org/content/dam/aba/events/labor_law/2015/march/tech/wu_cybersecurity.authcheckdam.pdf

https://www.csoonline.com/article/2126072/compliance/compliance-the-security-laws-regulations-and-guidelines-directory.html

https://csrc.nist.gov/projects/risk-management/detailed-overview

https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/security101.pdf

https://www.mintz.com/DesktopModules/Bring2mind/DMX/Download.aspx?EntryId=1469&PortalId=0&DownloadMethod=attachment

http://www.bankinfosecurity.com/glba-compliance-tips-for-building-successful-program-a-908/op-1

https://www.pcisecuritystandards.org/documents/PCI%20SSC%20Quick%20Reference%20Guide.pdf