If you get it, then protect it: Identify data assets that you collect and use only those to do core job tasks.
If in doubt, then find out: Question suspicious data. Share your doubts with your manager first before acting further with suspicious data.
When a data source is hacked, know when to, and how to act: Have, know, and act on a strategy to handle compromised data. Follow legal and business processes.
When data sharing isn’t successful, work to regain business trust: In the case of a data breach, whether information is incorrectly altered during operations or data gets sent to the wrong person, work towards not only fixing the issue but improving processes, educating users.
What do you do to share your data assets with care?