Some organizations create a specific consequence model for information security policy.
Violations can replace and absorb the broader HR polices that deal with disciplining individuals. A consequence model is intended to be punitive for the individual.
a. True
b. False