What safeguards are in place to ensure that only authorized users can launch Data Delete?
A. A number of checks and balances have been put in place to ensure only those personnel whom the Corporation authorizes are entitled to request the Data Delete service. Firstly, the signing officers of the company specify, in the Data Delete pre-authorization agreement, the Administrator-level Customer Center users (“Data Delete Administrators”) who are authorized to request a Data Delete. Secondly, these Data Delete Administrators are provided with a physical RSA SecurID token, or receive an Authorization Code by e-mail for each Data Delete operation. Finally, the Data Delete administrator’s email address must not have been changed in the preceding 72 hours. This last restriction applies only to accounts using emailed authorization codes.
A. A number of checks and balances have been put in place to ensure only those personnel whom the Corporation authorizes are entitled to request the Data Delete service. Firstly, the signing officers of the company specify, in the Data Delete pre-authorization agreement, the Administrator-level Customer Center users (“Data Delete Administrators”) who are authorized to request a Data Delete. Secondly, these Data Delete Administrators are provided with a physical RSA SecurID token, or receive an Authorization Code by e-mail for each Data Delete operation. Finally, the Data Delete administrator’s email address must not have been changed in the preceding 72 hours. This last restriction applies only to accounts using emailed authorization codes. To initiate the Data Delete from Customer Center, the Data Delete Administrator logs in, launches the Request Data Delete screen, selects the computer and Data Delete options, enters either the value on the RSA SecurID token display (which changes e