ŒΒlξ•ρ
₯l‹C‹LŽ–Χέ·έΈή
₯–ΪŽŸ
ψκŠT—v
ŒΒlξ•ρ‚Ζ‚Ν€”CˆΣ‚Μˆκl‚ΜŒΒl‚ΙŠΦ‚·‚ιξ•ρ‚Ε‚ ‚耂©‚Β‚»‚̏ξ•ρ‚ΙŠά‚ά‚κ‚ι‹Lq“™‚Ι‚ζ‚Α‚Δ“Α’θ‚ΜŒΒl‚πŽ―•Κ‚Ε‚«‚ι‚ΰ‚Μ‚πŽw‚·‘‰pŒκ‚Ε‚Ν personally identifiable information (PII) ‚ΰ‚΅‚­‚Ν sensitive personal information (SPI),[1][2][3] ‚ζ‚θˆκ”Κ‚Ι‚Ν personal data ‚ΖŒΔ‚Ξ‚κ‚ι‘
ψκ–ΪŽŸ
1.’θ‹`
2.ŒΒl‚ΙŠΦ‚·‚ιξ•ρ
3.ŒΒlξ•ρΓή°ΐΝή°½
4.ΜίΧ²ΚήΌ°
5.‘gD€—Μˆζ•Κ‚̏σ‘Τ
„₯5.1.s­‹@ŠΦ
„₯5.2.–―ŠΤŠι‹Ζ
„₯5.3.‹³ˆη‹@ŠΦ
„₯5.4.‰Ζ’λ
„€5.5.²έΐ°Θ―Δ
6.‚»‚Μ‘Ό
7.‹r’
8.ŠΦ˜A€–Ϊ

1. gManagement of Data Breaches Involving Sensitive Personal Information (SPI)h. Va.gov. Washington, DC: Department OF Veterans Affairs (2012”N1ŒŽ6“ϊ). 2015”N5ŒŽ26“ϊŽž“_‚Μ΅ΨΌήΕΩ‚ζ‚θ±°Ά²Μή‘2015”N5ŒŽ25“ϊ‰{——‘
2. Stevens, Gina (2012”N4ŒŽ10“ϊ). gData Security Breach Notification Lawsh. fas.org. 2015”N5ŒŽ25“ϊ‰{——‘
3. Greene, Sari Stern (2014). Security Program and Policies: Principles and Practices. Indianapolis, IN, US: Pearson IT Certification. p. 349. . OCLC 897789345. https://books.google.com/books?id=UbwiAwAAQBAJ&pg=PA349&lpg=PA349&dq=%22Sensitive+Personal+Information%22+SPI+%22Personally+identifiable+information%22&source=bl&ots=J9qIzMKebf&sig=Bdxa9ct4X4_2tmz44jmGCna3ZrE&hl=en&sa=X&ei=PaljVZfkJcvjoASh_4KYDA&ved=0CFQQ6AEwCA#v=onepage&q=%22Sensitive%20Personal%20Information%22%20SPI%20%22Personally%20identifiable%20information%22&f=false 2015”N5ŒŽ25“ϊ‰{——‘. 

o“T:Wikipedia
2018/06/12 01:30
ωΏl‹C‹LŽ–Χέ·έΈή
2018/07/15 XV
 1ˆΚ¨Š‹ŸŽu
 2ˆΚ¨–ƒŒ΄²W
 3ˆΚͺBANANA FISH
 4ˆΚ«“y’J³Žΐ
 5ˆΚͺ7ŒŽ14“ϊ
£γ‚Ι–ί‚ι
[9]WikipediaΔ―Μί
[0]gooΔ―Μί
‘–ΖΣŽ–€
(C)NTT Resonant