Issue 2: Breach Personal Identifiable Information Customer Data
Access within the organization threatens the customer data when an evil insider acquires the information. Access as a result of the organizations practices which inadvertantly share personal identifiable information.

Issue 2;

Breach by internal resources who are not authorized nor have a reasonable reason to acquire the information - an evil insider would seek to acquire the data. 

Breach in a host country when a resource from a country without laws or laws are written and ignored in practice - inadvertantly would grant access without authorization. 

Breach into the organizations systems by predefined partnerships or onsite consultants. 

In any case, the customer data and age of each person listed on each row in a table often has the greatest or 2nd greatest volume of duplicate tables.  An ODS system usually contains 1/3 customer/supplier/worker data and 1/3 item offer data with the balance of 1/3 sourcing from any number of uses. 

The age of the person would not change naturally and its a physical impossibility-as a personal identifiable identifier PII it can empower criminals to commit fraud and often white collar criminals benefit the most from access to the information.  

  • A person may correct their date of birth, if a legal process is followed - therefore a legal or justice system dependency and integration with the same should exist.
    • The hardest to reach populations have gaps in the facts collected and rarely participate in surveys used to show household data demographics;
      • A concerted effort to acquire and assure the safeguards required to meet the laws and enforce the laws with sanctions applied uniformly. 
        • Equality and Inequality require uniform enforcement or the law is merely a barrier and perception of justice
        • Far too often we introduce laws and claim the purpose as something and only apply the law to the poorest and persons of color. 
  • A person who must enter the date of birth - immediately puts themselves at risk for a man in middle or your workers must be ethical and trustworthy and have the skills to prevent breaches. 
  • Therefore "implicit order" would apply and replacing the acquisition of the personal identifiable information with a grouping of persons in an age segment using vectors or facts without the text detail about the person removes the risk to a person.    to establish a fact based use of the persons age for grouping without revealing the actual age of a person in technologies.  

Reverse engineering data to discover a person(s) personal identifiable information or threats caused by a person or technology used to harm people in identifying the pvectors associated with a persons privacy vectors are used to group and associate the implicit order and terms of use. 

CONTEXT(Help)
-
International EA and BA for Pattern Identification »International EA and BA for Pattern Identification
Transforming the World - A strategy »Transforming the World - A strategy
3 Innovate and Transform Category 30 »3 Innovate and Transform Category 30
Transformation for International Strategy »Transformation for International Strategy
Strategy Approaches »Strategy Approaches
A way to manage the implicit order while accelerating explicit order »A way to manage the implicit order while accelerating explicit order
Plan and Execute the use of tools for Implicit in the Explicit Order »Plan and Execute the use of tools for Implicit in the Explicit Order
Issue 2: Breach Personal Identifiable Information Customer Data
WSIS 4 Build Peace and effective, open, and accountable institutions.  »WSIS 4 Build Peace and effective, open, and accountable institutions.
+Comments (0)
+Citations (0)
+About