An organization handles sensitive information that must be displayed on call center technicians’ screens to verify the identities of remote callers. The technicians use three randomly selected fields of information to complete the identity verification process. Some of the fields contain PII that are unique identifiers for the remote callers. Which of the following should be implemented to identify remote callers while also reducing the risk that technicians could improperly use the identification information?
Bright07
2 weeks, 4 days agonezeranonymous
2 months, 2 weeks agoPesos
2 months, 2 weeks agoc4521e0
2 months, 3 weeks agogrelaman
3 months agoBright07
3 months, 1 week agoHereToStudy
3 months, 2 weeks agoServerBrain
5 months, 1 week ago