• Assess Your Data Now:

  • ACTION NEEDED:

    {accessibilityAction}

  • ACTION NEEDED:

    {accessibilityAction}

  • ACTION NEEDED:

    • Get IT buy-in to address policy issues
    • Evaluate infrastructure and security needs
  • ACTION NEEDED:

    {formatprotocolschemaAction}

  • ACTION NEEDED:

    {formatprotocolschemaAction}

  • ACTION NEEDED:

    {formatprotocolschemaAction}

  • ACTION NEEDED:

    {labelingAction}

  • ACTION NEEDED:

    {labelingAction}

  • ACTION NEEDED:

    {labelingAction}

  • ACTION NEEDED:

    {dataRelatabilityAction}

  • ACTION NEEDED:

    {dataRelatabilityAction}

  • ACTION NEEDED:

    {dataRelatabilityAction}

  • ACTION NEEDED:

    {processAlignmentAction}

  • ACTION NEEDED:

    {processAlignmentAction}

  • ACTION NEEDED:

    {processAlignmentAction}

  • ACTION NEEDED:

    {securityAction}

  • ACTION NEEDED:

    • Apply relevant software updates
    • Review and document encryption risks
    • Draft SOP so manual handling/rotation of secrets can be done securely
  • ACTION NEEDED:

    {securityAction}

  • Should be Empty: