Discuss the below:
Q: There are many ways in which someone can gain access to employee data. Share some of those ways and how you would address them after the fact. How would you prevent them from occurring again? How might you involve your information systems (IS) team in securing employee data?