Sunday, December 31, 2017

Keep your Information safe in your Computer & Mobile, Lesson 26

Data is classified into - Classified or Top Secret

Examples
Content of Corporate Investigation Reports
Top or Executive Management Compensation and Benefits
Business Plan/Strategy (both short and long-term)
Information relating to re-structuring and joint ventures

Care Required
When stored in electronic format, data, where possible, must be password protected and/or encrypted.
Access to data must be recorded/logged, tracked and regularly monitored.
When stored on mobile devices and media, protection and encryption measures provided through mechanisms approved by the Head of IT must be employed (e.g., access/password controls and 128 bit encryption).
Data must be stored in locked physical storages like drawers, rooms, or warehouses or areas where physical access is controlled by security guards, cipher locks, biometric controls, and/or card readers.
Data of this kind must not be sent via fax.
Data must not be posted on any public website.
Data must be opened by the intended addressee only.
Data must be destroyed when no longer needed, subject to the Group’s Data Retention Policy. Destruction of data can be in any of the following ways:
- Hard copies of documents containing classified information must be destroyed by shredding them or another approved process that destroys the data beyond recognition or reconstruction.
- Electronic storage media containing classified information must be appropriately sanitized by degaussing/bit by-bit formatting and physical destruction.
- Deleting files or re‐formatting media containing data in electronic format is NOT an acceptable method of destroying classified data.
Top Management must immediately be notified if classified data is accessed without proper authorization, lost, disclosed to unauthorized parties or is suspected of being lost or disclosed to unauthorized parties, or if any unauthorized use of Group information systems has taken place or is suspected of taking place.


Thanks for Read,
Please "SHARE" our post that your friends can read and learn and "COMMENT" us so that we can make our blog beautiful.

Please Follow us.
Facebook Profile
Twitter
Google+
facebook Page
Youtube
E-mail

2 comments:

  1. This comment has been removed by a blog administrator.

    ReplyDelete
  2. This comment has been removed by a blog administrator.

    ReplyDelete

Learn how hackers are stealing passwords to protect your own

Fixing the Leak: See How Hackers Are Stealing Your Passwords There is no way you are going to win a battle you are not prepared for. By pr...