Is Do you have an inventory of, or the ability to easily determine, the identity of each specific piece of PI collected and/or maintained by the DB/App such that you can copy or delete the PI on request, and can specifically identify its source, use (including purposes), and the parties with which it is shared (and their purposes for the data)? part of security assessment questionnaire you required to answer?

Findings can help you!

Learn More

Showcase your security posture

Start with our FREE account

Enterprise ?

Copyrights © Findings 2020