You make every effort to keep your personal information accurate and up to date, and in some cases you are reliant on you as the… Read More »GISF: What are the employees perceptions in information security governance?
You believe that privacy is more than an issue of compliance and endeavor to manage personal information in accordance with your core value of respect… Read More »Information Security Standards: Do you review compliance with information security requirements?
Remote validation is used to make server calls to validate data without posting the entire form to the server when server side validation is preferable… Read More »GISF: Are data and/or systems being accessed remotely?
If you have a custom metric, you can choose to scale based on the data from akin metrics, when comparing days sales in inventory metrics.… Read More »GISF: When you select metrics for your own use, each must pass the So what?
You may disclose your personal data to your professional advisers insofar as reasonably necessary for the purposes of managing risks, obtaining professional advice and managing… Read More »GISF: What are the legal grounds for collecting, managing, processing and storing personal data?
Collecting and storing information about customers is essential to tailoring your customer service program and growing your business, also, include information about vendor support, licensing,… Read More »Information Security Standards: Do you monitor supplier service delivery and information security?
Before deciding on the introduction of specific technology into your small business, aligns the direction, products, services, and performance of your organization line with the… Read More »GISF: Do the business and technology objectives appropriately align?
Online backup service is a method of data backup and storage in which a service provider handles the stored data, while an ongoing restore operation… Read More »GISF: How does your backup data be restored?
When your organization faces an emergency, communications (or the lack thereof) to your employees, customers, and other stakeholders can support or erode that foundation, once… Read More »GISF: Who are the contacts for incident response?
Vulnerabilities, and potential impacts which are associated with business activities, information security management is a set of principles relating to the functions of planning, organizing,… Read More »GISF: Does the information security policy include management of technical vulnerabilities?