An organization is concerned with authorized individuals accessing sensitive personal customer information to use for unauthorized purposes. Which of the following technologies is the BEST choice to mitigate this risk?
Which of the following is the BEST approach for a local office of a global organization faced with multiple privacy-related compliance requirements?