Business Driven Technology
Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 2, Problem 2MBD

Explanation of Solution

Types of sensitive data found in organizations:

Sensitive Information:

In a business or organization, sensitive information is the data that must be protected from unauthorized access to safeguard the privacy or security of the organization.

The types of sensitive information found in organization are mentioned below:

  • Human resource data: The human resource data sets are the data and information based on human resource management system and is sensitive information.
  • Competitive data: Organizations have data and analysis based on their competitive peers and rivals which are sensitive.
  • Strategic data: Organizations have data and analysis based on their various strategies such as market growth, value and product marketing which are sensitive.
  • Pricing data: Organizations have data and analysis based on their various strategies on market price and product price which are sensitive.
  • New Product development data: Organizations have data and analysis based on the new products to be developed and marketed which are sensitive.
  • Marketing data: Organizations have data and analysis based on their various strategies based on marketing which are sensitive.
  • Finance data: Organizations have data and analysis based on their various financial deals which are sensitive.
  • Employee salary data: The salary of the employees present in an organization is sensitive.
  • Customer data: The customer data present in an organization is sensitive.

Not everyone in an organization should have access to sensitive information as keeping sensitive data safe is a key priority for digital companies and policies for data sharing and data capture can help mitigate the issues of data security...

Blurred answer
Students have asked these similar questions
Why is it preferable to work from the top down when it comes to the safety of one's data?
In the earliest days of computers, how did individuals make sure that the information they stored was secure?
Because today's computers are so powerful, this is why it's happening. Are there any explanations for the rise of computers in schools over the last few decades, and if so, what data supports it?
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning