Classify the following scenario as major or minor non-conformity.
''The organization has a very mature information security policy. Lately, the organization has realized the need to focus on protection of PI. A formal PI identification exercise was done for this purpose and a mapping of PI and security controls was done. The organization has also put in place data masking technology in certain functions where the SPI was accessed by employees of a third party. However, the organization is yet to include PI specifically in its risk assessment exercise, incident management, testing, data classification and security architecture programs.''
Maryln
4 months agoLynelle
4 months agoGlendora
4 months agoAlishia
3 months agoMirta
4 months agoNatalie
4 months agoElly
4 months agoDesmond
5 months agoRemona
5 months agoMarylou
4 months agoLanie
4 months agoNieves
4 months agoPearline
5 months agoBritt
5 months agoDanilo
4 months agoTheola
4 months agoFrancoise
4 months agoEdward
5 months agoLatricia
5 months agoTheodora
5 months agoDarrel
5 months agoSean
5 months agoCarissa
5 months agoRosendo
5 months agoJody
4 months agoTrina
4 months agoDonte
4 months agoIrma
5 months agoElly
5 months ago