Which of the following is one of the fundamental principles of information security?
An organization is reliant on temporary contractors for performing data analytics and they require access to personal data via software-as-a-service to perform their job. When the temporary contractor completes their work assignment, what woul^.be the most effective way to safeguard privacy and access to personal data when they leave?
Which technique is most likely to facilitate the deletion of every instance of data associated with a deleted user account from every data store held by an organization?