Private or confidential data is defined in the Information Access and Protection (IAP ... an application or service and to identify potential red flags. To provide a risk assessment from an IT ...
You could distribute the risk assessment and ask people to read it and act on it. "Share - tell people what can go wrong and how it's being managed." Make sure control measures are put in place ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results