Biology, asked by njrk, 16 hours ago

Which support function under Tech Mahindra is governing Data Privacy and Protection related requirements
Information Security Group (ISG)
O Corporate Services (CS team)​

Answers

Answered by shankar89mishra
1

Answer:

bnmknbl nk b jbo na to

Explanation:

ga to be

Answered by qwstoke
0

The support function under Tech Mahindra that is governing Data Privacy and Protection related requirements is Information Security Group (ISG). ISG is responsible for defining and implementing data privacy and protection policies, procedures, and controls to ensure compliance with relevant laws, regulations, and industry standards. They provide guidance and support to business units and project teams in handling sensitive information and ensuring data privacy and protection.

The Information Security Group (ISG) at Tech Mahindra is a dedicated team of professionals who are responsible for managing and maintaining the security of the company's information assets. This includes data privacy and protection related requirements.

ISG is responsible for defining policies, procedures, and guidelines for information security, data privacy, and protection. They ensure that the company's information assets are secure, confidential, and protected from unauthorized access, use, disclosure, modification, or destruction.

ISG also conducts risk assessments, security audits, and vulnerability assessments to identify and mitigate security risks and vulnerabilities. They provide guidance and support to business units and project teams in implementing security controls and best practices.

In addition, ISG ensures compliance with relevant laws, regulations, and industry standards related to data privacy and protection. They monitor changes in the regulatory landscape and update policies and procedures as necessary to maintain compliance.

Overall, ISG plays a critical role in ensuring the security and privacy of Tech Mahindra's information assets and protecting the company and its clients from potential security breaches and cyber threats.

#SPJ3

Similar questions