Organizations should create data security policies based on business and regulatory requirements. A policy is a statement of a selected course of action and high-level description of desired behavior to …
Data Management – Record Management
Records Management includes the full lifecycle: from record creation or receipt through processing, distribution, organization, and retrieval, to disposition. Records can be physical (e.g., documents, memos, contracts, reports or microfiche); …
Data Management – Document Management
Data Management Professionals are stakeholders in decisions about document classification and retention. They must support consistency between the base structured data and specific unstructured data. Managing the lifecycle of documents …
Data Security – Types, Restrictions and Risks
Types of Data Security Facility Security Device Security Credential Security Identity Management Systems User ID Standards for Email Systems Password Standards Multiple Factor Identification Electronic Communication Security Data Security Restrictions …
Data Security – Essential Concepts
IS – Information Security has a specific Vocabulary. Knowledge of Key Terms enables Clearer Articulation of Governance Requirements. Threat is a Potential Offensive Action that could be taken against an …
Data Security – Goals and Principles
The Goals of Data Security Activities include: Enabling Compliance with Regulations and Policies for Privacy, Protection, and Confidentiality Ensuring that Stakeholder Requirements for Privacy and Confidentiality are Met Enabling Appropriate …
Data Security – Initiation
Let’s begin Information Security by Classifying an Organization’s Data in order to Identify which Data requires Protection. The Overall Process includes the following steps: Identify and Classify Sensitive Data Assets: …
Data Security – CRUD or CRUDE Matrix
A CRUD or CRUDE matrix is a useful way to capture and display activities and permissions within a system. You can use a CRUD matrix to observe how Processes handle …
ISMS – ISO/IEC-27001:2013 – Annex A
ISO = International Organization for Standardization IEC = International Electrotechnical Commission ISMS = Information Security Management System ISO/IEC-27001:2013 is the International Security Standard and Best Practice Guidelines, which details the …