Classify the following scenario as major or minor non-conformity.
''The organization has a very mature information security policy. Lately, the organization has realized the need to focus on protection of PI. A formal PI identification exercise was done for this purpose and a mapping of PI and security controls was done. The organization has also put in place data masking technology in certain functions where the SPI was accessed by employees of a third party. However, the organization is yet to include PI specifically in its risk assessment exercise, incident management, testing, data classification and security architecture programs.''
Maryln
7 months agoLynelle
7 months agoGlendora
8 months agoAlishia
7 months agoMirta
7 months agoNatalie
7 months agoElly
7 months agoDesmond
8 months agoRemona
8 months agoMarylou
7 months agoLanie
7 months agoNieves
7 months agoPearline
8 months agoBritt
8 months agoDanilo
7 months agoTheola
7 months agoFrancoise
7 months agoEdward
8 months agoLatricia
8 months agoTheodora
8 months agoDarrel
8 months agoSean
9 months agoCarissa
9 months agoRosendo
9 months agoJody
7 months agoTrina
7 months agoDonte
8 months agoIrma
8 months agoElly
9 months ago