160 likes | 306 Vues
Legal Threat Modeling Data Security Risks. Creation AdherenceEvaluation. 1. Is the business data intensive and what types of data does it collect?. Does the business use statutorily protected data?Does the business derive revenue from collecting, using and reselling consumer data?Is the busi
E N D