SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Information Security Management: Protecting

your Assets


By Emerson O. Bryan


We are in now officially in the Hurricane Season for this year, and while it is the norm for us here in the Caribbean to
focus on Business Continuity Planning, relative to hurricanes, and disaster preparedness to reduce exposure to
water damage, there is an even more urgent issue that we often don’t pay too much attention to. The other issue that
needs to be seriously considered by us as information management professionals is Information Security.


What is Information Security?


Definition


                  Systems and procedures designed to protect an organization’s information assets (throughout their
                  life cycle), from disclosure to any person or entity not authorized to have access to that information,
                  especially information which is considered sensitive, proprietary, confidential or classified, and
                  which protects the integrity of an organization’s information. (IRMT)


Information which may be needed to be kept secure may vary from organization to organization depending on the
operations/ type of business of the organization.


For example:


Type of Organization                   Type of information vulnerable


Hospital                               patient’s health records
Private‐Sector entity                  trade secrets, new product information, or innovative marketing strategies
Government with FOI legislation        exempt classes of records.




                                                           1
Some other commonly targeted information may include: customer lists, financial data, patent or copyright
information, legal transactions, executive correspondence, personnel records, research and development data,
marketing plans, budget projections and so on.




Strategies for Protecting Corporate Information


In order to minimize the risks of information theft, loss or leak, the following should be included in any organization’s
information security management programme:-


    1. Establish the basic objectives of the overall security programme of the organization;
        2. Define the various responsibilities of each staff member, consultant and vendor representative;
        3. Solicit the cooperation of your Legal Counsel, IT Manager, Finance Director and other key personnel for
          their input into the programme;
    4. Ensure that all corporate legal information and trade secrets are properly registered and copyrighted;
    5. Assess the risks that loss or theft of various information may pose to the organization;
    6. Establish information security policies and procedures (including all the penalties outlined if breached);
    7. Establish procedures for continuous auditing, monitoring and evaluation of the system.




How does Records Management relate to this?


Some essential policy components specific to recordkeeping may be:-


    ‱     Ensuring proper Security Classification of all records according to the assessed risk(s) that they may pose if
          exposed, NB. This can be done by using numerical coded taxonomy when coding files and correspondence,
          which will aid both in the identification and the protection of sensitive information;
    ‱     Educate users on the methods that are to be used to secure sensitive records ensuring that these
          procedures are clearly indicated (preferably in a RM Manual) and observed by all levels of staff;
    ‱     Establish after discussion with senior management, the procedures to be followed when responding to
          requests for the releasing of company documents, information and records to persons external to the
          organization;
    ‱     Get senior management to outline in a statement to new and existing employees that any record created by,

                                                              2
and used by them during the discharge of their duties is the exclusive property of the organization;
    ‱    Practice redacting to ensure the continued security of documents when sharing information that is subjected
         to FOI legislation;
    ‱    Don’t label records with stamps such as ‘CONFIDENTIAL’ or ‘SECRET’—these will instead draw curiosity,
         use instead special color coded folders (e.g.; pink, blue or buff) and keep confidential records segregated in
         a ‘secure area’ and in a locked filing equipment;
    ‱    Always ensure that the movement/ transportation of the records within the building (and if possible off-site
         as well) is secure;
    ‱    Observe a ‘Clean Desk’ Policy, where at the close of business each day, all employees clear their desks
         and lock away all files and correspondence.


Internal Document Control
Facsimiles


It is often the case that most facsimile machines are usually located (i.e.; for both dispatched and received faxes), in
a centralized or public area and therefore restricted documents conveyed by this method is susceptible to possible
interception or inadvertent or deliberate exposure. It is recommend that sensitive information not be transmitted via
fax; unless you know for-a-fact that the fax is being sent directly to the intended recipient or the machine is in a
secure area.


Personal Computers


Methods of securing documents:


    ‱    Users should treat phone numbers to dial-up their computers to the company servers or ISP as carefully as
         their passwords;

    ‱    Users should never leave their computers unattended for any extended period whilst logged-on without
         having either a password protected screen saver, or a secure monitor energy-saver;

    ‱    Terminal/ keyboard locks employing the use of passwords for computer access, (preferably along with a
         challenge-response calculator);

    ‱    Automated audit trails to enable system security personnel to trace any additions/ deletions/ changes back
         to the person who initiated them, and which also indicates where and when the changes occurred;

    ‱    Utilize removable hard/ optical disk drives or desktop docking ports for laptops, but when these are not in
         use, stow them in a secure storage area and never leave them openly unattended;


                                                             3
‱      Back-up disks and tapes must also be securely stored and regularly purged;

    ‱      Always within a highly classified security networked environment, establish ‘dummy terminals’ ‘i.e.; disk
           less’ workstations for public use;



Reprographics


    ‱      Ideally, employees should make only the minimum number of copies that are actually needed;
    ‱      Ensure that ‘sensitive’ documents are not ‘accidentally’ left by the photocopier.


Internal Literature


Most company newsletters, memoranda other ‘in-house documents’ often contain information, while not sensitive, but
which was intended primarily for internal use. Therefore, care should be taken whenever decisions are being made
regarding content for these publications, and to whom it should be circulated to.


Disposal


Never throw records or documents into office waste bins without properly shredding them before. You must dispose
of them in a secure and approved manner, which may be: burning, shredding (preferably with a cross-shredder) or by
pulping.


Finally, when disposing of computer equipment, ensure that hard disk drives are reformatted or de-magnetized to
ensure that there is no information left in volatile memory, and most importantly, since we hardly use them
anymore
ensure and that no floppy disks are left in the drive(s)!




Emerson O. St. G. Bryan




                                                             4
Mr. Bryan has been a Records and Information Management practitioner for over
                          twelve (12) years; currently he is the Information and Document Management
                          Specialist with the Caribbean Regional Negotiating Machinery (CRNM) in Barbados.
                          And has worked with several regional organizations including: the United Nations
                          Department of Economic and Social Affairs (UN-DESA), the Caribbean Centre for
                          Development Administration (CARICAD), and the Ministry of Foreign Affairs and
                          Foreign Trade of Jamaica.

                          He is also an Associate Consultant/ Trainer at Lorson Resources Limited, “the
                          Records and Information Company of the Caribbean”, which is based in Trinidad and
                          Tobago, see: www.lorsonresources.com/seminar1.asp

Emerson O. St. G. Bryan   Contact: emerson.bryan@gmail.com




                                                      5

Weitere Àhnliche Inhalte

Andere mochten auch

Laparoscopy 5
Laparoscopy  5Laparoscopy  5
Laparoscopy 5guest9dc181
 
Laparoscopy 2
Laparoscopy  2Laparoscopy  2
Laparoscopy 2guest9dc181
 
Ovary Hyperstimulation 5
Ovary  Hyperstimulation 5Ovary  Hyperstimulation 5
Ovary Hyperstimulation 5guest9dc181
 
Ovary Hyperstimulation 3
Ovary  Hyperstimulation 3Ovary  Hyperstimulation 3
Ovary Hyperstimulation 3guest9dc181
 
E Bryan - An Analysis Of Content And Information Management As Drivers For E...
E  Bryan - An Analysis Of Content And Information Management As Drivers For E...E  Bryan - An Analysis Of Content And Information Management As Drivers For E...
E Bryan - An Analysis Of Content And Information Management As Drivers For E...Emerson Bryan
 
Introduction to Records Management - Getting Organized - Files & Records - Se...
Introduction to Records Management - Getting Organized - Files & Records - Se...Introduction to Records Management - Getting Organized - Files & Records - Se...
Introduction to Records Management - Getting Organized - Files & Records - Se...Emerson Bryan
 
Ovarian Hyperstimulation Syndrome
Ovarian Hyperstimulation SyndromeOvarian Hyperstimulation Syndrome
Ovarian Hyperstimulation Syndromeguest9dc181
 
Hysteroscopy
HysteroscopyHysteroscopy
Hysteroscopyguest9dc181
 
Infertility Hysteroscopy
Infertility HysteroscopyInfertility Hysteroscopy
Infertility Hysteroscopyguest9dc181
 
Hysteroscopy
HysteroscopyHysteroscopy
Hysteroscopyguest9dc181
 
E. Bryan - Work Programme UNDESA-CARICAD TASF on E-Government
E. Bryan - Work Programme UNDESA-CARICAD TASF on E-GovernmentE. Bryan - Work Programme UNDESA-CARICAD TASF on E-Government
E. Bryan - Work Programme UNDESA-CARICAD TASF on E-GovernmentEmerson Bryan
 
E. Bryan - Penetration Of ICTs Within The Caribbean Region
E. Bryan - Penetration Of ICTs Within The Caribbean RegionE. Bryan - Penetration Of ICTs Within The Caribbean Region
E. Bryan - Penetration Of ICTs Within The Caribbean RegionEmerson Bryan
 
Hyperprolactinemia
HyperprolactinemiaHyperprolactinemia
Hyperprolactinemiaguest9dc181
 
Ovarian Hyperstimulation Syndrome
Ovarian Hyperstimulation SyndromeOvarian Hyperstimulation Syndrome
Ovarian Hyperstimulation Syndromeguest9dc181
 
BARIM Presentation - Cloud Computing & Records Management
BARIM Presentation - Cloud Computing & Records ManagementBARIM Presentation - Cloud Computing & Records Management
BARIM Presentation - Cloud Computing & Records ManagementEmerson Bryan
 
0807æ±‚ć­æˆćŠŸïŒšć”ć·ąéŽćșŠćˆșæż€
0807æ±‚ć­æˆćŠŸïŒšć”ć·ąéŽćșŠćˆșæż€0807æ±‚ć­æˆćŠŸïŒšć”ć·ąéŽćșŠćˆșæż€
0807æ±‚ć­æˆćŠŸïŒšć”ć·ąéŽćșŠćˆșæż€guest9dc181
 
Infertility Hysteroscopy
Infertility HysteroscopyInfertility Hysteroscopy
Infertility Hysteroscopyguest9dc181
 

Andere mochten auch (17)

Laparoscopy 5
Laparoscopy  5Laparoscopy  5
Laparoscopy 5
 
Laparoscopy 2
Laparoscopy  2Laparoscopy  2
Laparoscopy 2
 
Ovary Hyperstimulation 5
Ovary  Hyperstimulation 5Ovary  Hyperstimulation 5
Ovary Hyperstimulation 5
 
Ovary Hyperstimulation 3
Ovary  Hyperstimulation 3Ovary  Hyperstimulation 3
Ovary Hyperstimulation 3
 
E Bryan - An Analysis Of Content And Information Management As Drivers For E...
E  Bryan - An Analysis Of Content And Information Management As Drivers For E...E  Bryan - An Analysis Of Content And Information Management As Drivers For E...
E Bryan - An Analysis Of Content And Information Management As Drivers For E...
 
Introduction to Records Management - Getting Organized - Files & Records - Se...
Introduction to Records Management - Getting Organized - Files & Records - Se...Introduction to Records Management - Getting Organized - Files & Records - Se...
Introduction to Records Management - Getting Organized - Files & Records - Se...
 
Ovarian Hyperstimulation Syndrome
Ovarian Hyperstimulation SyndromeOvarian Hyperstimulation Syndrome
Ovarian Hyperstimulation Syndrome
 
Hysteroscopy
HysteroscopyHysteroscopy
Hysteroscopy
 
Infertility Hysteroscopy
Infertility HysteroscopyInfertility Hysteroscopy
Infertility Hysteroscopy
 
Hysteroscopy
HysteroscopyHysteroscopy
Hysteroscopy
 
E. Bryan - Work Programme UNDESA-CARICAD TASF on E-Government
E. Bryan - Work Programme UNDESA-CARICAD TASF on E-GovernmentE. Bryan - Work Programme UNDESA-CARICAD TASF on E-Government
E. Bryan - Work Programme UNDESA-CARICAD TASF on E-Government
 
E. Bryan - Penetration Of ICTs Within The Caribbean Region
E. Bryan - Penetration Of ICTs Within The Caribbean RegionE. Bryan - Penetration Of ICTs Within The Caribbean Region
E. Bryan - Penetration Of ICTs Within The Caribbean Region
 
Hyperprolactinemia
HyperprolactinemiaHyperprolactinemia
Hyperprolactinemia
 
Ovarian Hyperstimulation Syndrome
Ovarian Hyperstimulation SyndromeOvarian Hyperstimulation Syndrome
Ovarian Hyperstimulation Syndrome
 
BARIM Presentation - Cloud Computing & Records Management
BARIM Presentation - Cloud Computing & Records ManagementBARIM Presentation - Cloud Computing & Records Management
BARIM Presentation - Cloud Computing & Records Management
 
0807æ±‚ć­æˆćŠŸïŒšć”ć·ąéŽćșŠćˆșæż€
0807æ±‚ć­æˆćŠŸïŒšć”ć·ąéŽćșŠćˆșæż€0807æ±‚ć­æˆćŠŸïŒšć”ć·ąéŽćșŠćˆșæż€
0807æ±‚ć­æˆćŠŸïŒšć”ć·ąéŽćșŠćˆșæż€
 
Infertility Hysteroscopy
Infertility HysteroscopyInfertility Hysteroscopy
Infertility Hysteroscopy
 

Ähnlich wie E Bryan Information Security Management Protecting Your Assets

1. Introduction.pptx
1. Introduction.pptx1. Introduction.pptx
1. Introduction.pptxEllenGrace9
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptxEllenGrace9
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOAtlantic Training, LLC.
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...RIYAJAIN179446
 
cybersecurity
cybersecurity cybersecurity
cybersecurity AkshaySajith3
 
Q2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion ServicesQ2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion ServicesMarielenaCruzat
 
Information Security
Information SecurityInformation Security
Information Securityhaneefvf1
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Case Study
Case StudyCase Study
Case Studylneut03
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239#TheFraudTube
 
Your Employees and Information Security
Your Employees and Information SecurityYour Employees and Information Security
Your Employees and Information SecurityShred-it
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
How to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdfHow to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdfJose thomas
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxgemaherd
 

Ähnlich wie E Bryan Information Security Management Protecting Your Assets (20)

1. Introduction.pptx
1. Introduction.pptx1. Introduction.pptx
1. Introduction.pptx
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPO
 
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
iSchoolConnect_Information Security User Awareness Training_16th Nov 2021.ppt...
 
cybersecurity
cybersecurity cybersecurity
cybersecurity
 
Q2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion ServicesQ2-W6- Tourism Promotion Services
Q2-W6- Tourism Promotion Services
 
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data SecurityPACE-IT, Security+ 4.4: Controls to Ensure Data Security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
 
Information Security
Information SecurityInformation Security
Information Security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Case Study
Case StudyCase Study
Case Study
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Your Employees and Information Security
Your Employees and Information SecurityYour Employees and Information Security
Your Employees and Information Security
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
How to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdfHow to secure your company's financial data in 4 simple steps..pdf
How to secure your company's financial data in 4 simple steps..pdf
 
12 security policies
12 security policies12 security policies
12 security policies
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 

Mehr von Emerson Bryan

Professional Certificate in Supervisory Management
Professional Certificate in Supervisory ManagementProfessional Certificate in Supervisory Management
Professional Certificate in Supervisory ManagementEmerson Bryan
 
Jamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business communityJamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business communityEmerson Bryan
 
RIM a filip to KM through the SECI Model
RIM a filip to KM through the SECI ModelRIM a filip to KM through the SECI Model
RIM a filip to KM through the SECI ModelEmerson Bryan
 
International Archives and Records and Information Management
International Archives and Records and Information ManagementInternational Archives and Records and Information Management
International Archives and Records and Information ManagementEmerson Bryan
 
Certified Archivist (CA)
Certified Archivist (CA)Certified Archivist (CA)
Certified Archivist (CA)Emerson Bryan
 
ACP Attestation - Emerson Bryan
ACP Attestation - Emerson Bryan ACP Attestation - Emerson Bryan
ACP Attestation - Emerson Bryan Emerson Bryan
 
UWI OC Letter of Attestation
UWI OC Letter of Attestation UWI OC Letter of Attestation
UWI OC Letter of Attestation Emerson Bryan
 
BNSI - Letter of Attestation
BNSI - Letter of AttestationBNSI - Letter of Attestation
BNSI - Letter of AttestationEmerson Bryan
 
Certified Records Analyst (CRA)
Certified Records Analyst (CRA)Certified Records Analyst (CRA)
Certified Records Analyst (CRA)Emerson Bryan
 
ICRM Email - CRA
ICRM Email - CRAICRM Email - CRA
ICRM Email - CRAEmerson Bryan
 
Certified Records Analyst (CRA) Qualification
Certified Records Analyst (CRA) QualificationCertified Records Analyst (CRA) Qualification
Certified Records Analyst (CRA) QualificationEmerson Bryan
 
MIND Policy Forum - December 2017
MIND Policy Forum - December 2017MIND Policy Forum - December 2017
MIND Policy Forum - December 2017Emerson Bryan
 
E. Bryan - Changing the Paradigm - Record and Information Management for Pub...
E. Bryan -  Changing the Paradigm - Record and Information Management for Pub...E. Bryan -  Changing the Paradigm - Record and Information Management for Pub...
E. Bryan - Changing the Paradigm - Record and Information Management for Pub...Emerson Bryan
 
Feith - Records Management Diploma
Feith - Records Management DiplomaFeith - Records Management Diploma
Feith - Records Management DiplomaEmerson Bryan
 
University Certificate: Museum Conservation Skills
University Certificate: Museum Conservation SkillsUniversity Certificate: Museum Conservation Skills
University Certificate: Museum Conservation SkillsEmerson Bryan
 
The CARIFESTA XIII Symposium - Schedule August 11-23, 2017
The CARIFESTA XIII Symposium - Schedule August 11-23, 2017The CARIFESTA XIII Symposium - Schedule August 11-23, 2017
The CARIFESTA XIII Symposium - Schedule August 11-23, 2017Emerson Bryan
 
E. Bryan Digital curation of digital cultural assets- Mutual interest of AL...
E. Bryan   Digital curation of digital cultural assets- Mutual interest of AL...E. Bryan   Digital curation of digital cultural assets- Mutual interest of AL...
E. Bryan Digital curation of digital cultural assets- Mutual interest of AL...Emerson Bryan
 
E. Bryan - Traditional Knowledge Digital Repository - Considerations for Domi...
E. Bryan - Traditional Knowledge Digital Repository - Considerations for Domi...E. Bryan - Traditional Knowledge Digital Repository - Considerations for Domi...
E. Bryan - Traditional Knowledge Digital Repository - Considerations for Domi...Emerson Bryan
 
IVCC - Certificate (Basico II)
IVCC - Certificate (Basico II)IVCC - Certificate (Basico II)
IVCC - Certificate (Basico II)Emerson Bryan
 
SLCC 2016 Presentation Schedule - Day 2
SLCC 2016 Presentation Schedule - Day 2SLCC 2016 Presentation Schedule - Day 2
SLCC 2016 Presentation Schedule - Day 2Emerson Bryan
 

Mehr von Emerson Bryan (20)

Professional Certificate in Supervisory Management
Professional Certificate in Supervisory ManagementProfessional Certificate in Supervisory Management
Professional Certificate in Supervisory Management
 
Jamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business communityJamaica's Data Protection Act: Compliance required from the business community
Jamaica's Data Protection Act: Compliance required from the business community
 
RIM a filip to KM through the SECI Model
RIM a filip to KM through the SECI ModelRIM a filip to KM through the SECI Model
RIM a filip to KM through the SECI Model
 
International Archives and Records and Information Management
International Archives and Records and Information ManagementInternational Archives and Records and Information Management
International Archives and Records and Information Management
 
Certified Archivist (CA)
Certified Archivist (CA)Certified Archivist (CA)
Certified Archivist (CA)
 
ACP Attestation - Emerson Bryan
ACP Attestation - Emerson Bryan ACP Attestation - Emerson Bryan
ACP Attestation - Emerson Bryan
 
UWI OC Letter of Attestation
UWI OC Letter of Attestation UWI OC Letter of Attestation
UWI OC Letter of Attestation
 
BNSI - Letter of Attestation
BNSI - Letter of AttestationBNSI - Letter of Attestation
BNSI - Letter of Attestation
 
Certified Records Analyst (CRA)
Certified Records Analyst (CRA)Certified Records Analyst (CRA)
Certified Records Analyst (CRA)
 
ICRM Email - CRA
ICRM Email - CRAICRM Email - CRA
ICRM Email - CRA
 
Certified Records Analyst (CRA) Qualification
Certified Records Analyst (CRA) QualificationCertified Records Analyst (CRA) Qualification
Certified Records Analyst (CRA) Qualification
 
MIND Policy Forum - December 2017
MIND Policy Forum - December 2017MIND Policy Forum - December 2017
MIND Policy Forum - December 2017
 
E. Bryan - Changing the Paradigm - Record and Information Management for Pub...
E. Bryan -  Changing the Paradigm - Record and Information Management for Pub...E. Bryan -  Changing the Paradigm - Record and Information Management for Pub...
E. Bryan - Changing the Paradigm - Record and Information Management for Pub...
 
Feith - Records Management Diploma
Feith - Records Management DiplomaFeith - Records Management Diploma
Feith - Records Management Diploma
 
University Certificate: Museum Conservation Skills
University Certificate: Museum Conservation SkillsUniversity Certificate: Museum Conservation Skills
University Certificate: Museum Conservation Skills
 
The CARIFESTA XIII Symposium - Schedule August 11-23, 2017
The CARIFESTA XIII Symposium - Schedule August 11-23, 2017The CARIFESTA XIII Symposium - Schedule August 11-23, 2017
The CARIFESTA XIII Symposium - Schedule August 11-23, 2017
 
E. Bryan Digital curation of digital cultural assets- Mutual interest of AL...
E. Bryan   Digital curation of digital cultural assets- Mutual interest of AL...E. Bryan   Digital curation of digital cultural assets- Mutual interest of AL...
E. Bryan Digital curation of digital cultural assets- Mutual interest of AL...
 
E. Bryan - Traditional Knowledge Digital Repository - Considerations for Domi...
E. Bryan - Traditional Knowledge Digital Repository - Considerations for Domi...E. Bryan - Traditional Knowledge Digital Repository - Considerations for Domi...
E. Bryan - Traditional Knowledge Digital Repository - Considerations for Domi...
 
IVCC - Certificate (Basico II)
IVCC - Certificate (Basico II)IVCC - Certificate (Basico II)
IVCC - Certificate (Basico II)
 
SLCC 2016 Presentation Schedule - Day 2
SLCC 2016 Presentation Schedule - Day 2SLCC 2016 Presentation Schedule - Day 2
SLCC 2016 Presentation Schedule - Day 2
 

KĂŒrzlich hochgeladen

Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Call Girls In Holiday Inn Express Gurugram➄99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➄99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➄99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➄99902@11544 ( Best price)100% Genu...lizamodels9
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Trucks in Minnesota
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...Suhani Kapoor
 
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 

KĂŒrzlich hochgeladen (20)

Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Call Girls In Holiday Inn Express Gurugram➄99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➄99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➄99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➄99902@11544 ( Best price)100% Genu...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | â‚č5k To 25k Wit...
 
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➄99902@11544 ( Best price)100% Genuine Escort In 24...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 

E Bryan Information Security Management Protecting Your Assets

  • 1. Information Security Management: Protecting your Assets By Emerson O. Bryan We are in now officially in the Hurricane Season for this year, and while it is the norm for us here in the Caribbean to focus on Business Continuity Planning, relative to hurricanes, and disaster preparedness to reduce exposure to water damage, there is an even more urgent issue that we often don’t pay too much attention to. The other issue that needs to be seriously considered by us as information management professionals is Information Security. What is Information Security? Definition Systems and procedures designed to protect an organization’s information assets (throughout their life cycle), from disclosure to any person or entity not authorized to have access to that information, especially information which is considered sensitive, proprietary, confidential or classified, and which protects the integrity of an organization’s information. (IRMT) Information which may be needed to be kept secure may vary from organization to organization depending on the operations/ type of business of the organization. For example: Type of Organization Type of information vulnerable Hospital patient’s health records Private‐Sector entity trade secrets, new product information, or innovative marketing strategies Government with FOI legislation exempt classes of records. 1
  • 2. Some other commonly targeted information may include: customer lists, financial data, patent or copyright information, legal transactions, executive correspondence, personnel records, research and development data, marketing plans, budget projections and so on. Strategies for Protecting Corporate Information In order to minimize the risks of information theft, loss or leak, the following should be included in any organization’s information security management programme:- 1. Establish the basic objectives of the overall security programme of the organization; 2. Define the various responsibilities of each staff member, consultant and vendor representative; 3. Solicit the cooperation of your Legal Counsel, IT Manager, Finance Director and other key personnel for their input into the programme; 4. Ensure that all corporate legal information and trade secrets are properly registered and copyrighted; 5. Assess the risks that loss or theft of various information may pose to the organization; 6. Establish information security policies and procedures (including all the penalties outlined if breached); 7. Establish procedures for continuous auditing, monitoring and evaluation of the system. How does Records Management relate to this? Some essential policy components specific to recordkeeping may be:- ‱ Ensuring proper Security Classification of all records according to the assessed risk(s) that they may pose if exposed, NB. This can be done by using numerical coded taxonomy when coding files and correspondence, which will aid both in the identification and the protection of sensitive information; ‱ Educate users on the methods that are to be used to secure sensitive records ensuring that these procedures are clearly indicated (preferably in a RM Manual) and observed by all levels of staff; ‱ Establish after discussion with senior management, the procedures to be followed when responding to requests for the releasing of company documents, information and records to persons external to the organization; ‱ Get senior management to outline in a statement to new and existing employees that any record created by, 2
  • 3. and used by them during the discharge of their duties is the exclusive property of the organization; ‱ Practice redacting to ensure the continued security of documents when sharing information that is subjected to FOI legislation; ‱ Don’t label records with stamps such as ‘CONFIDENTIAL’ or ‘SECRET’—these will instead draw curiosity, use instead special color coded folders (e.g.; pink, blue or buff) and keep confidential records segregated in a ‘secure area’ and in a locked filing equipment; ‱ Always ensure that the movement/ transportation of the records within the building (and if possible off-site as well) is secure; ‱ Observe a ‘Clean Desk’ Policy, where at the close of business each day, all employees clear their desks and lock away all files and correspondence. Internal Document Control Facsimiles It is often the case that most facsimile machines are usually located (i.e.; for both dispatched and received faxes), in a centralized or public area and therefore restricted documents conveyed by this method is susceptible to possible interception or inadvertent or deliberate exposure. It is recommend that sensitive information not be transmitted via fax; unless you know for-a-fact that the fax is being sent directly to the intended recipient or the machine is in a secure area. Personal Computers Methods of securing documents: ‱ Users should treat phone numbers to dial-up their computers to the company servers or ISP as carefully as their passwords; ‱ Users should never leave their computers unattended for any extended period whilst logged-on without having either a password protected screen saver, or a secure monitor energy-saver; ‱ Terminal/ keyboard locks employing the use of passwords for computer access, (preferably along with a challenge-response calculator); ‱ Automated audit trails to enable system security personnel to trace any additions/ deletions/ changes back to the person who initiated them, and which also indicates where and when the changes occurred; ‱ Utilize removable hard/ optical disk drives or desktop docking ports for laptops, but when these are not in use, stow them in a secure storage area and never leave them openly unattended; 3
  • 4. ‱ Back-up disks and tapes must also be securely stored and regularly purged; ‱ Always within a highly classified security networked environment, establish ‘dummy terminals’ ‘i.e.; disk less’ workstations for public use; Reprographics ‱ Ideally, employees should make only the minimum number of copies that are actually needed; ‱ Ensure that ‘sensitive’ documents are not ‘accidentally’ left by the photocopier. Internal Literature Most company newsletters, memoranda other ‘in-house documents’ often contain information, while not sensitive, but which was intended primarily for internal use. Therefore, care should be taken whenever decisions are being made regarding content for these publications, and to whom it should be circulated to. Disposal Never throw records or documents into office waste bins without properly shredding them before. You must dispose of them in a secure and approved manner, which may be: burning, shredding (preferably with a cross-shredder) or by pulping. Finally, when disposing of computer equipment, ensure that hard disk drives are reformatted or de-magnetized to ensure that there is no information left in volatile memory, and most importantly, since we hardly use them anymore
ensure and that no floppy disks are left in the drive(s)! Emerson O. St. G. Bryan 4
  • 5. Mr. Bryan has been a Records and Information Management practitioner for over twelve (12) years; currently he is the Information and Document Management Specialist with the Caribbean Regional Negotiating Machinery (CRNM) in Barbados. And has worked with several regional organizations including: the United Nations Department of Economic and Social Affairs (UN-DESA), the Caribbean Centre for Development Administration (CARICAD), and the Ministry of Foreign Affairs and Foreign Trade of Jamaica. He is also an Associate Consultant/ Trainer at Lorson Resources Limited, “the Records and Information Company of the Caribbean”, which is based in Trinidad and Tobago, see: www.lorsonresources.com/seminar1.asp Emerson O. St. G. Bryan Contact: emerson.bryan@gmail.com 5