Which of the following are key contributors that would enhance the complexity in implementing security measures for protection of personal information? (Choose all that apply.)
A.
Data collection through multiple modes and channels
B.
Evolution of nimble and flexible business processes affecting access management
C.
Regulatory requirements to issue privacy notice and data breach notification in specified format
The complexity of implementing data security for personal information is often influenced by operational and architectural factors such as:
A: Collecting data through various channels like web forms, mobile apps, customer support, etc., which introduces complexity in tracking and securing each channel.
B: Flexible and dynamic business processes that evolve rapidly can complicate access management due to frequent changes in user roles, workflows, and data access needs.
While regulatory requirements (C) do impact privacy governance, they do not directly contribute to the complexity of implementing technical security measures.
==============
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit