U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

PROTECTING INFORMATION ASSETS

NCJ Number
35929
Journal
Security Management Volume: 20 Issue: 3 Dated: (JULY 1976) Pages: 30-32
Author(s)
B MENKUS
Date Published
1976
Length
3 pages
Annotation
A BRIEF OUTLINE OF THE SECURITY MEASURES WHICH MAY BE TAKEN TO PROTECT AN ORGANIZATIONHS INFORMATION ASSETS AGAINST THREATS FROM WITHOUT AND ABUSE AND MANIPULATION FROM WITHIN.
Abstract
ORGANIZATIONS ARE INCREASINGLY DEPENDENT ON INFORMATION FILES, AND AS A RESULT, ARE INCREASINGLY LIABLE SHOULD THESE FILES BE COMPROMISED. SEVERAL MANAGEMENT DATA PROTECTION PLANNING CONSIDERATIONS ARE EXAMINED TO HELP ORGANIZATIONS AVOID THESE LIABILITIES. IT IS NOTED THAT THE SCOPE AND TYPE OF DATA, COLLECTION AND HANDLING PRACTICES, ACCESSIBILITY OF DATA, AND RETENTION OF DATA MUST BE EXAMINED FOR SECURITY PLANNING PURPOSES. DATA PROTECTION CONTROLS MAY THEN BE IMPLEMENTED IN THE FOLLOWING AREAS: HIRING AND ASSIGNMENT OF KEY PERSONNEL, ACQUISITION AND USE OF DATA, SENSITIVE DATA, TO THE DATA PROCESSING FACILITY, AND THE DUPLICATION AND DISTRIBUTION OF INFORMATION.

Downloads

No download available

Availability