Back to the MIT repository
2. Privacy & Security2 - Post-deployment

Confidentiality loss

Confidentiality loss - Unauthorised sharing of sensitive, confidential information and documents such as corporate strategy and financial plans with third-parties.

Source: MIT AI Risk Repositorymit955

ENTITY

3 - Other

INTENT

3 - Other

TIMING

2 - Post-deployment

Risk ID

mit955

Domain lineage

2. Privacy & Security

186 mapped risks

2.0 > Privacy & Security

Mitigation strategy

1. Enforce strict Role-Based Access Control (RBAC) and the Principle of Least Privilege to ensure that access to highly sensitive documents, such as corporate strategy and financial plans, is restricted solely to authorized personnel with a demonstrable need-to-know, and conduct regular audits of access permissions. 2. Implement and actively manage a comprehensive Data Loss Prevention (DLP) system across network, endpoint, and cloud environments. This system must be configured to monitor, detect, and automatically block the unauthorized exfiltration or sharing of classified confidential data with external third parties. 3. Mandate regular and rigorous employee training programs focused on the identification and proper handling of confidential and sensitive information. Training should emphasize data classification policies, the criticality of corporate confidentiality, and the recognition of social engineering and insider threat indicators.