Dealing with Data: balancing the risk and utility of an integral business asset
…know whether the access environment prevents unauthorised use – this entails both the IT and physical environment. Sensitive data should only be accessed by secure research centers: A locked room…