C. Applying audit trails to resources to monitor company personnel goes beyond just controlling access—it actively monitors and records how data is used after access is granted. This is crucial for limiting data use because it provides a mechanism to detect and respond to any misuse or unauthorized use of data within the organization.
In summary:
A and D are about controlling access and rights, but C specifically focuses on limiting data use by providing continuous oversight through monitoring and auditing, making it the best option for improving the system of limiting data use.
Answer is D, based on Privacy in Technology book. All answer is correct, but base on priority, first one is explicit consent on secondary use, second is user authentication
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Ssourav
3 months, 2 weeks agoPaigeH7
8 months, 1 week agorajiabdmjd
1 year, 7 months agorajiabdmjd
1 year, 7 months agoSbowo
2 years, 11 months agok4d4v4r
3 years ago837vq3
3 years, 1 month ago