Classify the following scenario as major or minor non-conformity.
''The organization has a very mature information security policy. Lately, the organization has realized the need to focus on protection of PI. A formal PI identification exercise was done for this purpose and a mapping of PI and security controls was done. The organization has also put in place data masking technology in certain functions where the SPI was accessed by employees of a third party. However, the organization is yet to include PI specifically in its risk assessment exercise, incident management, testing, data classification and security architecture programs.''
Maryln
5 months agoLynelle
5 months agoGlendora
6 months agoAlishia
5 months agoMirta
5 months agoNatalie
5 months agoElly
5 months agoDesmond
6 months agoRemona
6 months agoMarylou
5 months agoLanie
5 months agoNieves
5 months agoPearline
6 months agoBritt
6 months agoDanilo
5 months agoTheola
5 months agoFrancoise
5 months agoEdward
6 months agoLatricia
6 months agoTheodora
6 months agoDarrel
6 months agoSean
7 months agoCarissa
7 months agoRosendo
7 months agoJody
5 months agoTrina
5 months agoDonte
6 months agoIrma
6 months agoElly
7 months ago