🎁BACK-TO-SCHOOL DEAL. Subscribe Now to get 40% OFF at only 8.49 USD/month, only valid until Sep 30th, 2024

Question

Question
- Tom is working on a report that contains employees names, home addresses, and salary. Which of the following is Tom prohibited from doing with the reporta Submit Enaypting it Using his home computer to print the report while teleworking E-miling it to a collevgue who needs to provide missing data able to complete the training or save the certificate of completion.

Asked By WhisperingDreams70 at

Answered By Expert

Jacob

Expert · 4.8k answers · 4k people helped

The image shows a multiple-choice question related to appropriate handling of sensitive information in a workplace setting. The question is:

“Tom is working on a report that contains employees’ names, home addresses, and salary. Which of the following is Tom prohibited from doing with the report?”

The options provided are:

A) Storing it in his locked desk drawer after working hours

B) Encrypting it

C) Using his home computer to print the report while teleworking

D) E-mailing it to a colleague who needs to provide missing data

Without specific context or company policy, it’s difficult to definitively answer the question. However, generally speaking, the most secure options for handling sensitive information would be to store it securely (such as in a locked desk drawer) and to encrypt it. Using a home computer to print the report could be a security risk depending on the security of the home network and printer. E-mailing sensitive information can also be a risk if the email system is not secure or if the information is not encrypted.

Based on typical data protection practices, the option that Tom is most likely prohibited from doing is:

C) Using his home computer to print the report while teleworking

This is because home networks are generally less secure than those in a controlled office environment, and printing sensitive information at home could lead to unauthorized access. However, the correct answer could vary depending on the specific security protocols of Tom’s workplace.