Classify the following scenario as major or minor non-conformity.
''The organization has a very mature information security policy. Lately, the organization has realized the need to focus on protection of PI. A formal PI identification exercise was done for this purpose and a mapping of PI and security controls was done. The organization has also put in place data masking technology in certain functions where the SPI was accessed by employees of a third party. However, the organization is yet to include PI specifically in its risk assessment exercise, incident management, testing, data classification and security architecture programs.''
Eden
4 months agoDulce
5 months agoVirgina
5 months agoCorinne
5 months agoNgoc
5 months agoJillian
6 months agoAvery
6 months agoMyra
6 months agoFlorencia
6 months agoMaybelle
6 months agoKris
6 months agoBeth
6 months agoHoney
6 months agoCarla
6 months agoMaryln
1 year agoLynelle
1 year agoGlendora
1 year agoAlishia
1 year agoMirta
1 year agoNatalie
1 year agoElly
1 year agoDesmond
2 years agoRemona
2 years agoMarylou
1 year agoLanie
1 year agoNieves
1 year agoPearline
2 years agoBritt
2 years agoDanilo
1 year agoTheola
1 year agoFrancoise
1 year agoEdward
2 years agoLatricia
2 years agoTheodora
2 years agoDarrel
2 years agoSean
2 years agoCarissa
2 years agoRosendo
2 years agoJody
1 year agoTrina
1 year agoDonte
1 year agoIrma
2 years agoElly
2 years ago