Final analysis needs to address:
A.Explain the security features your recommended technology solution should have.
B. Briefly explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposed technology.
C. Briefly describe the internal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provide examples.