| http://www.w3.org/ns/prov#value | - Identify locations where PII is likely to be used and stored, including employee types or classes that have access to and use of the data, and the original source of the PII. These ???likely locations??? also suggest questions that can be asked to locate PII and help determine whether a breached system is likely to contain PII.
|