QQuestionInformation Technology
QuestionInformation Technology
"Tessa is processing payroll data that includes employees' names, home addresses, and salaries. Which of the following is Tessa prohibited from doing with the data?
A. Using her home computer to print the data while working remotely
B. Encrypting it
C. Storing it in her locked desk drawer after working hours
D. Securely e-mailing it to a colleague who needs to provide missing data"
11 months agoReport content
Answer
Full Solution Locked
Sign in to view the complete step-by-step solution and unlock all study resources.
Step 1:Let's solve this problem step by step, focusing on data privacy and protection principles.
Step 2:: Understand the Context
This is a data privacy scenario involving employee personal and sensitive information. Tessa must follow appropriate data protection protocols to ensure employee confidentiality.
Step 3:: Analyze Each Option
A. Using her home computer to print the data while working remotely - This could potentially be a security risk, depending on the company's data protection policies - Home networks and personal computers might not have the same security protections as office systems B. Encrypting it - Encryption is a recommended best practice for protecting sensitive data - This is typically an APPROVED method of securing confidential information C. Storing it in her locked desk drawer after working hours - Physical security is an important aspect of data protection - A locked desk drawer is a standard, acceptable method of securing sensitive documents D. Securely e-mailing it to a colleague who needs to provide missing data - Sharing employee data should only be done through secure, authorized channels - Without specific authorization, this could potentially violate data privacy regulations
Step 4:: Identify the Prohibited Action
The key is to find which action is NOT recommended or allowed under standard data protection guidelines.
Final Answer
Securely e-mailing it to a colleague who needs to provide missing data is the action Tessa is prohibited from doing. Sharing sensitive employee information via email, even if intended to be secure, can potentially breach data privacy regulations and expose confidential information to unauthorized access. Rationale: - Employee data is highly sensitive - Sharing such information requires strict protocols - Email is not considered a secure method for transmitting personal employee information - Proper channels like secure internal systems should be used for data sharing
Need Help with Homework?
Stuck on a difficult problem? We've got you covered:
- Post your question or upload an image
- Get instant step-by-step solutions
- Learn from our AI and community of students