skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 89628 Find in a Library
Title: Data Security and Data Processing, Volume 3, Part 1 - State of Illinois - Executive Overview
Corporate Author: IBM
Data Processing Division
United States of America
Date Published: 1974
Page Count: 41
Sponsoring Agency: IBM
White Plains, NY 10604
Publication Number: G 320-1372-0
Format: Document
Language: English
Country: United States of America
Annotation: The ten action steps outlined provide general guidance to executives for developing an information system that ensures data privacy.
Abstract: Step 1, reviewing an information system's requirements, includes determining what data is being collected, who needs the data, why they need it, when they need it, and whether all new uses of data are cleared through the executive in charge. Step 2, analyzing the confidentiality and criticality of information, includes determining how complex the information classification structure should be and how much protection is required for each kind of information. Step 3, assessing vulnerabilities and risks, involves identifying current risks to data privacy and assessing how much the risk could be reduced given an increase in security protection. Step 4, investigating technological safeguards, consists of determining the technological safeguards currently being used by the organization and assessing the effectiveness of available technological safeguards. Subsequent steps in chronological order include budgeting for information privacy, organizing for information privacy, establishing individual accountability, implementing technological safeguards, creating a privacy-conscious environment, and auditing the system. An executive action chart is provided, along with 26 bibliographic listings. For related documents, see NCJ 89626-27, 89629-32, and 89655-60.
Index Term(s): Computer privacy and security; Cost effectiveness analysis; Data security; Program planning; Security systems
Note: Prepared by Project SAFE (Secure Automated Facility Environment).
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.