Answer:
These should include, for example: Ensuring that confidential information is always locked away at night, and not left unattended during the day; Password-protecting sensitive computer files; Marking confidential information clearly as such, and ensuring that paper copies are shredded before disposal
Explanation: