Country of Residence
Social Security Number
Security Tier 1
Security Tier 2
Security Tier 3
Security Tier 4
Where the information will be stored
How files should be named
Who can access the information
Which encoding should be used for files
How the access list can be formatted
How the data should be destroyed
A breach in security. He should have declined taking responsibility for documents outside his project.
A security protocol exception. He can receive the documents as long as Jill was informed.
A non-issue. He works with the same client as Jill and so has the same security access.
A breach in security. He should have asked Jeremy to sign a receipt before accepting the documents.
Yes, he should have the same security clearance as Jarred.
No, he should create his own data to conduct his tests.
Yes, as long as they both inform their manager first.
No, he has to wait for Jarred to finish his tests first.
Ignore the shared file. She has the same security clearance level so no harm was done.
Try to remove the share. Jennifer doesn’t need to be bothered with a simple mistake like this.
Ask Jennifer to remove the share. Let her revisit how and with whom the file should be shared.
Ask Jennifer to remove the share and report the incident to [email protected]
Ask Michi to share the access to Production with him.
Request from his manager to allow Michi to share the access to Production with him.
Request an exemption from IT Security & Compliance to allow Michi to share the access with him.
Defer the update to the module until a license becomes available.
Escalate the situation to his manager to work it out with the client.
Customer Contact Numbers (Fax, Telephone, Mobile)
Birth dates, admission dates, discharge dates, dates of death
Account information numbers (Social Security, Health record, licenses)