and 3rd party systems housing confidential/private data. Develop and enhance an information security management detect current or possible breaches of electronic data and information systems, as well as their origins audit trails, system logs, and other monitoring data sources are checked on a regular basis and adhere