Question 3
An IT company commissions a new software for Human Resources (HR) management. This new software replaces a legacy software used in the
shakesha
organization for around 20 years. Which of the following security practices are important to prevent data leaks during the decommissioning of the legacy
HR software? (Select TWO correct options)