Differentiate how data is maintained and utilized.

Differentiation should include data

  • at rest (e.g., storage, cloud vs. local)
  • in transit (e.g., transmission, data encryption)
  • being processed (e.g., memory, transaction)
  • that is archived. 

Process/Skill Questions: 

  • What is the security protocol for securing marketing data?
  • Who is responsible for the data during all stages of data utilization?
  • What are some considerations for securing data during maintenance and use?
  • How does the type of data influence how it must be secured?