In the lecture on IoT, we reviewed a document from a U.S.-le…
In the lecture on IoT, we reviewed a document from a U.S.-led consortium who published a Security Compliance Framework. Regarding the subject of a user being able to remove their personal data from a device, please indicate the sections that are applicable (credit is given for correct selection(s); credit is deducted for incorrect selections). (Despite this appearing to be a scavenger hunt for a meaningless datapoint, the goal is to reflect familiarity with the documents reviewed in class and studied for your stellar career improvement!)
Read Details