ŒÂlî•ñ
¥l‹C‹LŽ–×ݷݸÞ
¥–ÚŽŸ
øêŠT—v
ŒÂlî•ñ‚Ƃͤ”CˆÓ‚̈êl‚̌l‚ÉŠÖ‚·‚éî•ñ‚Å‚ ‚褂©‚‚»‚̏î•ñ‚ÉŠÜ‚Ü‚ê‚é‹Lq“™‚É‚æ‚Á‚Ä“Á’è‚̌l‚ðŽ¯•Ê‚Å‚«‚é‚à‚Ì‚ðŽw‚·¡‰pŒê‚Å‚Í personally identifiable information (PII) ‚à‚µ‚­‚Í sensitive personal information (SPI),[1][2][3] ‚æ‚èˆê”Ê‚É‚Í personal data ‚ƌĂ΂ê‚é¡
øê–ÚŽŸ
1.’è‹`
2.ŒÂl‚ÉŠÖ‚·‚éî•ñ
3.ŒÂlî•ñÃÞ°ÀÍÞ°½
4.ÌßײÊÞ¼°
5.‘gD¤—̈æ•Ê‚̏ó‘Ô
„¥5.1.s­‹@ŠÖ
„¥5.2.–¯ŠÔŠé‹Æ
„¥5.3.‹³ˆç‹@ŠÖ
„¥5.4.‰Æ’ë
„¤5.5.²ÝÀ°È¯Ä
6.‚»‚Ì‘¼
7.‹r’
8.ŠÖ˜A€–Ú

1. gManagement of Data Breaches Involving Sensitive Personal Information (SPI)h. Va.gov. Washington, DC: Department OF Veterans Affairs (2012”N1ŒŽ6“ú). 2015”N5ŒŽ26“úŽž“_‚̵ؼÞÅقæ‚è±°¶²ÌÞ¡2015”N5ŒŽ25“ú‰{——¡
2. Stevens, Gina (2012”N4ŒŽ10“ú). gData Security Breach Notification Lawsh. fas.org. 2015”N5ŒŽ25“ú‰{——¡
3. Greene, Sari Stern (2014). Security Program and Policies: Principles and Practices. Indianapolis, IN, US: Pearson IT Certification. p. 349. . OCLC 897789345. https://books.google.com/books?id=UbwiAwAAQBAJ&pg=PA349&lpg=PA349&dq=%22Sensitive+Personal+Information%22+SPI+%22Personally+identifiable+information%22&source=bl&ots=J9qIzMKebf&sig=Bdxa9ct4X4_2tmz44jmGCna3ZrE&hl=en&sa=X&ei=PaljVZfkJcvjoASh_4KYDA&ved=0CFQQ6AEwCA#v=onepage&q=%22Sensitive%20Personal%20Information%22%20SPI%20%22Personally%20identifiable%20information%22&f=false 2015”N5ŒŽ25“ú‰{——¡. 

o“T:Wikipedia
2018/06/12 01:30
ù¿l‹C‹LŽ–×ݷݸÞ
2018/06/18 XV
 1ˆÊ¨¬—Ñ—R”üŽq
 2ˆÊ¨H—tŒ´’Ê‚è–‚Ž–Œ
 3ˆÊª6ŒŽ17“ú
 4ˆÊ«‰¼–ÊײÀÞ°ËÞÙÄÞ
 5ˆÊªÄްʂ̔ߌ€
£ã‚É–ß‚é
[9]WikipediaįÌß
[0]gooįÌß
¡–Ɛӎ–€
(C)NTT Resonant