Answer: 1. Identify how data ownership will be determined.
2 Identify how data will be
Step-by-step explanation:
Following the information given in the question, as a security administrator, the tasks which should be completed during this phase are
• Identify how data ownership will be determined.
• Identify how data will be shared.
It should be noted that at this stage, resetting all passwords won't be determined yet.