Classify the following scenario as major or minor non-conformity.
''The organization has a very mature information security policy. Lately, the organization has realized the need to focus on protection of PI. A formal PI identification exercise was done for this purpose and a mapping of PI and security controls was done. The organization has also put in place data masking technology in certain functions where the SPI was accessed by employees of a third party. However, the organization is yet to include PI specifically in its risk assessment exercise, incident management, testing, data classification and security architecture programs.''
Eden
3 months agoDulce
3 months agoVirgina
3 months agoCorinne
4 months agoNgoc
4 months agoJillian
4 months agoAvery
4 months agoMyra
4 months agoFlorencia
5 months agoMaybelle
5 months agoKris
5 months agoBeth
5 months agoHoney
5 months agoCarla
5 months agoMaryln
1 year agoLynelle
1 year agoGlendora
1 year agoAlishia
1 year agoMirta
1 year agoNatalie
1 year agoElly
1 year agoDesmond
1 year agoRemona
1 year agoMarylou
1 year agoLanie
1 year agoNieves
1 year agoPearline
1 year agoBritt
1 year agoDanilo
1 year agoTheola
1 year agoFrancoise
1 year agoEdward
1 year agoLatricia
1 year agoTheodora
1 year agoDarrel
1 year agoSean
1 year agoCarissa
1 year agoRosendo
1 year agoJody
1 year agoTrina
1 year agoDonte
1 year agoIrma
1 year agoElly
1 year ago