33 Using a web browser, search for any information security policies used at your academic institution. Compare them

Using a web browser, search for any information security policies used at your academic institution. Compare them to the ones discussed in this chapter. Are there sections missing? If so, which ones?