skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 35929 Find in a Library
Title: PROTECTING INFORMATION ASSETS
Journal: SECURITY MANAGEMENT  Volume:20  Issue:3  Dated:(JULY 1976)  Pages:30-32
Author(s): B MENKUS
Corporate Author: American Soc for Industrial Security
United States of America
Date Published: 1976
Page Count: 3
Sponsoring Agency: American Soc for Industrial Security
Arlington, VA 22209
Format: Article
Language: English
Country: United States of America
Annotation: A BRIEF OUTLINE OF THE SECURITY MEASURES WHICH MAY BE TAKEN TO PROTECT AN ORGANIZATIONHS INFORMATION ASSETS AGAINST THREATS FROM WITHOUT AND ABUSE AND MANIPULATION FROM WITHIN.
Abstract: ORGANIZATIONS ARE INCREASINGLY DEPENDENT ON INFORMATION FILES, AND AS A RESULT, ARE INCREASINGLY LIABLE SHOULD THESE FILES BE COMPROMISED. SEVERAL MANAGEMENT DATA PROTECTION PLANNING CONSIDERATIONS ARE EXAMINED TO HELP ORGANIZATIONS AVOID THESE LIABILITIES. IT IS NOTED THAT THE SCOPE AND TYPE OF DATA, COLLECTION AND HANDLING PRACTICES, ACCESSIBILITY OF DATA, AND RETENTION OF DATA MUST BE EXAMINED FOR SECURITY PLANNING PURPOSES. DATA PROTECTION CONTROLS MAY THEN BE IMPLEMENTED IN THE FOLLOWING AREAS: HIRING AND ASSIGNMENT OF KEY PERSONNEL, ACQUISITION AND USE OF DATA, SENSITIVE DATA, TO THE DATA PROCESSING FACILITY, AND THE DUPLICATION AND DISTRIBUTION OF INFORMATION.
Index Term(s): Computer privacy and security; Data integrity; Data security; Industrial security; Information Systems and Technology
Note: *This document is currently unavailable from NCJRS.
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=35929

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.