U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Data Security and Data Processing, Volume 3, Part 1 - State of Illinois - Executive Overview

NCJ Number
89628
Date Published
1974
Length
41 pages
Annotation
The ten action steps outlined provide general guidance to executives for developing an information system that ensures data privacy.
Abstract
Step 1, reviewing an information system's requirements, includes determining what data is being collected, who needs the data, why they need it, when they need it, and whether all new uses of data are cleared through the executive in charge. Step 2, analyzing the confidentiality and criticality of information, includes determining how complex the information classification structure should be and how much protection is required for each kind of information. Step 3, assessing vulnerabilities and risks, involves identifying current risks to data privacy and assessing how much the risk could be reduced given an increase in security protection. Step 4, investigating technological safeguards, consists of determining the technological safeguards currently being used by the organization and assessing the effectiveness of available technological safeguards. Subsequent steps in chronological order include budgeting for information privacy, organizing for information privacy, establishing individual accountability, implementing technological safeguards, creating a privacy-conscious environment, and auditing the system. An executive action chart is provided, along with 26 bibliographic listings. For related documents, see NCJ 89626-27, 89629-32, and 89655-60.

Downloads

No download available

Availability