39
results found in
4 ms
Page 1
of 4
Risk-case confidential personal data are not sufficiently protected
Resulting in abuse of data
Full description
Resulting in abuse of data
Full description
Risk-case lack of regulations concerning the protection of confidential data on a group of entities
Resulting in information leaks
Full description
Resulting in information leaks
Full description
Risk-case list of controls to mitigate risks
Resulting in more consistent effects and easier evaluation
Full description
Resulting in more consistent effects and easier evaluation
Full description
Risk-case mandatory strategies implemented incompletely
Resulting in lower level of information security
Full description
Resulting in lower level of information security
Full description
Risk-case lack of strategic leader
Resulting in slower and costly implementation of the program
Full description
Resulting in slower and costly implementation of the program
Full description
Risk-case only few e-services are developed
Resulting in project does not help to save resources
Full description
Resulting in project does not help to save resources
Full description
Risk-case no input controls and poor monitoring
Resulting in erroneous data and fraudulent transactions
Full description
Resulting in erroneous data and fraudulent transactions
Full description