BSBXCS303 Securely Manage Personally Identifiable Information and Workplace Info


Portfolio Objectives 

You are required to demonstrate skills and knowledge to securely manage personally identifiable information (PII) and workplace information. You are required to read and understand a predetermined issue and/or situation and participate in a number of assessment activities.

The following are the goals and objectives to complete this assessment task:

• Handle PII and workplace information responsibly
• Review current standards, practices and procedures relating to workplace information
• Identify sensitive data in own workplace environment according to organisational policies and procedures and within scope of own role
• Classify workplace information types according to organisational procedures
• Apply privacy policies to all data devices that require confidentiality
• Store and share PII and workplace information securely
• Organise obtained data sets in an easily retrievable format
• Implement required access control protocols for identified sensitive data
• Confirm that data is accurate, up-to-date, and comprehensive
• Identify and report malfunctioning infrastructure and attacks on infrastructure that pose a threat to data integrity
• Apply information protection protocols
• Conduct back-up of on-site and off-site data according to organisational policies and procedures
• Conduct privacy impact assessments on data
• Confirm adherence to data protection compliance standards

You must use the template below to record the answers for this assessment activity. 

Template: Identify, review, and classify sensitive data relating to workplace information List five (5) things considered as sensitive information in the workplace.

Review current Skillage IT information Security Policy and suggest areas for improvement. List five (5) categories considered as sensitive information in the workplace. List five (5) data devices that should be covered under Skillage IT’s privacy policy that require confidentiality.

List five (5) best practices for securing sensitive information.  

tag Read less

Leave a Reply

Your email address will not be published. Required fields are marked *