An organization handles sensitive information that must be displayed on call center technicians’ screens to verify the identities of remote callers. The technicians use three randomly selected fields of information to complete the identity verification process. Some of the fields contain PII that are unique identifiers for the remote callers. Which of the following should be implemented to identify remote callers while also reducing the risk that technicians could improperly use the identification information?
Bright07
4 months agonezeranonymous
6 months agoPesos
6 months agoc4521e0
6 months, 1 week agogrelaman
6 months, 2 weeks agoBright07
6 months, 3 weeks agoHereToStudy
7 months agoServerBrain
8 months, 3 weeks ago