166k views
5 votes
Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective _________ program.

2 Answers

3 votes

Answer:

Information systems security program

Step-by-step explanation:

Information systems security refers to the processes and methodologies involved with keeping information confidential, available, and assuring its integrity.

The points mentioned in the question show characteristics of a good system security program:

  • To establish a good information security program, one must know the sensitive information then organization is collecting,
  • Know how long this information will be stored for, to determine the type of storage and disposal systems that will be used.
  • Know the access control measures that will be put in place to safe guard the system
  • Know how this organization is using this data. which could be in form of reference, analysis or forecasting.

These are key elements of the Information systems security program

User Fazle Rabbi Ador
by
4.2k points
2 votes

Answer:

Data privacy

Step-by-step explanation:

Full question

Conducting a thorough assessment to document what sensitive information an organization is collecting, where it is stored, how long it is kept, who has access to it, and how the organization is using this data is one of the critical tasks in establishing an effective ____ program

a. data structuring

b. data privacy

c. data recovery

d. data piracy

Data privacy is very crucial for any company using sensitive information. It s major pillar is who has authorized access to collect information , keep it and who can use that infomation and how that information is being used . Data pivacy is allowed but must be managed efficiently

User Hpekristiansen
by
4.8k points