| http://www.w3.org/ns/prov#value | - Consider this: Actions such as on-boarding a new customer or employee, promoting a staff member, terminating a contractor, merging companies or departments, or delivering a new product all require changes in identities and access to sensitive information.
|