Question: Using Sprinklr, Nike could have a digital customer profile for each of its customers. Provide two examples of computer security procedures (also known as controls)
Using Sprinklr, Nike could have a digital customer profile for each of its customers. Provide two examples of computer security procedures (also known as controls) that Nike (or Sprinklr) could use to protect Nikes customer data from unauthorized disclosure, specific to the last point listed in Table 3.3 Data should not be disclosed for reasons incompatible with the business objective for which they are collected. Include HOW the data could be protected and WHAT data could be protected for each security procedure or control. WHAT customer data could be protected by WHICH computer security procedure and HOW? (i) Example 1 (ii) Example 2
TABLE 3:3 Privacy Policy Guidelines: A Sampler Data Collection Data should be collected on individuals only for the purpose of accomplishing a legitimate business objective. Data should be adequate, relevant, and not excessive in relation to the business objective. Individuals must give their consent before data pertaining to them can be gathered. Such consent may be implied from the individual's actions (e.g., applications for credit, insurance, or employment). Data Accuracy Sensitive data gathered on individuals should be verified before they are entered into the database. Data should be kept current, where and when necessary. The file should be made available so that the individual can ensure that the data are correct. In any disagreement about the accuracy of the data, the individual's version should be noted and included with any disclosure of the file. Data Confidentiality Computer security procedures should be implemented to ensure against unauthorized disclosure of data. These procedures should include physical, technical, and administrative security measures. Third parties should not be given access to data without the individual's knowledge or permission, except as required by law. Disclosures of data, other than the most routine, should be noted and maintained for as long as the data are maintained. Data should not be disclosed for reasons incompatible with the business objective for which they are collected