|
Post by juthi52943 on Jan 6, 2024 1:18:46 GMT -6
Unauthorized disclosure or unauthorized access to personal data transmitted, stored or otherwise processed - and which may in particular, lead to physical damage, property damage or non-material damage. Dealing with risk The third stage of the risk management process involves modifying risks that exceed an acceptable threshold. It is often called risk mitigation, risk minimization, risk elimination, risk prevention or risk reduction, depending on how the risk is handled. They may be avoiding risk by deciding Job Function Email List not to start or continue activities that cause risk, taking or increasing risk in order to take advantage of an opportunity, removing the source of risk, change in probability, change of consequences, sharing risk with another partyies, risk behavior based on an informed decision. It is recommended to choose an variant or variants that will ensure a significant risk reduction with relatively small expenditure. When choosing variants, you do not have to limit yourself to only one, because it often turns out that it is beneficial to choose, for example, a change in probability and a change in consequences. Example In order to minimize risk, security measures are used, . organizational and technical measures. They should be sufficient to ensure an adequate level of protection of the data processing process. If, after taking into account the results of the resource risk analysis.
|
|