Which of the following would BEST address the risk of data leakage?
Answer options:
A. File backup procedures
B. Database integrity checks
C. Acceptable use policies
D. Incident response procedures
Answer correct:
C
Acceptable use policies are the best measure for preventing the unauthorized disclosure of confidential information. The other choices do not address confidentiality of information.