To minimize the invasion of privacy, users and organizations should:

Question 14 options:

provide wrong data to unauthorized users.

use verification procedures to ensure data accuracy.

keep collected information even after the stated purpose is over.

provide access to one’s personal information to all interested parties.

use verification procedures to ensure data accuracy.