Which of the following is the BEST way to mitigate the risk of inappropriate access to personally identifiable information (PII) by third-party cloud service personnel?
A.
Utilize data encryption standards throughout the information life cycle
B.
Ensure security clearance is in place within the third-party hiring process
C.
Choose a third-party provider in a jurisdiction with few privacy regulations
D.
Include data security requirements in the service level agreement (SLA)
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
mynk29
3 months, 3 weeks agoCbtL
4 months, 3 weeks agoKoulyo
5 months, 2 weeks agojohn_boogieman
6 months, 3 weeks ago