Skip to main content
Skip to footer

Geo John

Data Privacy Consultant, TCS Cyber Security

Hussain Mirza

Data Privacy Consultant, TCS Cyber Security

Organizations processing PII must take appropriate measures to end security risk

To address key factors contributing to privacy non-compliance, adopt this four-step approach to:

  • Discover PII attributes and purpose of processing
  • Prioritize business processes that handle PII
  • Conduct privacy impact assessments
  • Implement solutions to remedy risk