I lean towards option C since it mentions user groups, which seems relevant to how we handle vulnerabilities, but I could be mixing it up with another concept.
I've got a good feeling about option D. The whole point of a PIA is to understand the privacy risks associated with a system or process, so that you can address them. The other options are important, but I think understanding the risks is the primary driver for doing a PIA.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Micah
4 months agoBobbie
4 months agoVeronika
5 months agoOmer
5 months agoBrett
5 months agoMelda
5 months agoDallas
5 months agoMose
5 months agoKirk
5 months agoJolene
5 months agoDaniela
5 months agoHarrison
6 months ago