3 Which, if any, data listed as important may be subject to legislative or regulatory constraints?4 Explain the key reason behind the backup strategy and schedule. 4 List any risk mitigation strategies for user documents, failover techniques and system redundancy that could be employed.4 REFERENCES 5 TASKS 1 List the threats that could impact any of the important data listed above? A data backup is a process that help for archiving and copying the entire folder or files for the purpose to restore all information in