An it company commissions a new software for Human Resources [HR) management. This new software replaces a legacy software used in the organization for around 20 years. Which of the following security practices are important to prevent data leaks during the decommissioning of the legacy HR software?

An it company commissions a new software for Human Resources [HR) management. This new software replaces a legacy software used in the organization for around 20 years. Which of the following security practices are important to prevent data leaks during the decommissioning of the legacy HR software?

Leave a Comment

Comments

No comments yet. Why don’t you start the discussion?

    Comments