Securing Personal Information

Securing Personal Information

  • Leveraging technology is a concept that is not going anywhere anytime soon. How does your organization guard against a breach of your personal information? Provide at least 2 examples and support them with evidence.
  • Compare and contrast your organization’s approach to at least one other of your classmate’s post.

Answer preview

Technological advances have seen the switch of storing personal information from the traditional paper system to the more efficient computer system. Computer systems process and store personal information such as passwords, social security numbers, credit card data, financial and other personal data. In my organization, it is a priority to keep this information safe and protected from intrusion by third parties, in order to prevent cases such as fraud and identity theft. We first take note of the type of personal information our company has and the people who have access to it. The organization mostly deals with the credit card and financial information from the transactions done through the online shopping platform(353words)

Scroll to Top