Classify the following scenario as major or minor non-conformity.
''The organization has a very mature information security policy. Lately, the organization has realized the need to focus on protection of PI. A formal PI identification exercise was done for this purpose and a mapping of PI and security controls was done. The organization has also put in place data masking technology in certain functions where the SPI was accessed by employees of a third party. However, the organization is yet to include PI specifically in its risk assessment exercise, incident management, testing, data classification and security architecture programs.''
Maryln
3 months agoLynelle
3 months agoGlendora
3 months agoAlishia
2 months agoMirta
2 months agoNatalie
3 months agoElly
3 months agoDesmond
3 months agoRemona
3 months agoMarylou
3 months agoLanie
3 months agoNieves
3 months agoPearline
4 months agoBritt
4 months agoDanilo
2 months agoTheola
2 months agoFrancoise
3 months agoEdward
3 months agoLatricia
3 months agoTheodora
3 months agoDarrel
4 months agoSean
4 months agoCarissa
4 months agoRosendo
4 months agoJody
3 months agoTrina
3 months agoDonte
3 months agoIrma
3 months agoElly
4 months ago