SlideShare ist ein Scribd-Unternehmen logo
1 von 20
What you should know about Data Protection An Information Security Management System for SMEs Copyright Octree Limited September 2011 1
Copyright Octree Limited September 2011 2 Tony Richardson  CISSP Tony.richardson@octree.co.uk www.octree.co.uk www.securapro.co.uk T:  08456 171819 M: 07967 033487 Octree Limited The lloyds Building Birds Hill Letchworth Herts.   SG6 1JE
Foreward “The blunt truth is that all organisations need to take the protection of customer data with the utmost seriousness. I have made clear publicly on several occasions over the past year that organisations holding individuals’ data must in particular take steps to ensure that it is adequately protected from loss or theft. There have been several high-profile incidents of data loss in public and private sectors during that time which have highlighted that some organisations could do much better. The coverage of these incidents has also raised public awareness of how lost or stolen data can be used for crimes like identity fraud. Getting data protection wrong can bring commercial, reputational, regulatory and legal penalties. Getting it right brings rewards in terms of customer trust and confidence”. 	Richard Thomas – Information Commissioner (2008) Copyright Octree Limited September 2011 3
Legal and Regulatory Obligations  ,[object Object]
PCI-DSS v2
Computer Misuse Act 1990
The ICO can issue fines up to £500,000Copyright Octree Limited September 2011 4
Data Protection Principles of the Data Protection Act 1998 The seventh principle: ,[object Object],Copyright Octree Limited September 2011 5
The Solution – a 15 point plan ,[object Object],    Risk: 	“the likelihood of a threat exploiting a vulnerability in an 	information asset, and the resulting impact on the business.” ,[object Object]
Assess the potential threats to those assets – environmental, natural, human (internal and external / accidental and malicious)
Determine the possible vulnerabilities in those assets
Consider, and deploy, the necessary countermeasures
ReviewCopyright Octree Limited September 2011 6
The Solution – a 15 point plan ,[object Object]
Develop a security policy document that everyone, from senior management to junior members of staff can “buy in to”.
Avoid ambiguity
Identify roles and responsibilities
State legal and regulatory obligations
Clearly state actions in the event of a policy breach (or suspected breach!)
Emphasise consequences

Weitere ähnliche Inhalte

Was ist angesagt?

information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
guest34b014
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
ecommerce
 

Was ist angesagt? (20)

The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
information security technology
information security technologyinformation security technology
information security technology
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Information Security
Information SecurityInformation Security
Information Security
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Information security and research data
Information security and research dataInformation security and research data
Information security and research data
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 

Ähnlich wie Best Practices For Information Security Management 2011

Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Meeting your information security obligations april 2012
Meeting your information security obligations april 2012
Tony Richardson CISSP
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
Mark Bennett
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
rtodd599
 

Ähnlich wie Best Practices For Information Security Management 2011 (20)

Meeting your information security obligations april 2012
Meeting your information security obligations april 2012Meeting your information security obligations april 2012
Meeting your information security obligations april 2012
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Securing Management Information Systems.ppt
Securing Management Information Systems.pptSecuring Management Information Systems.ppt
Securing Management Information Systems.ppt
 
08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt08 -Securing Information Systems at workplace.ppt
08 -Securing Information Systems at workplace.ppt
 
Automatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy StandardsAutomatski - The Internet of Things - Privacy Standards
Automatski - The Internet of Things - Privacy Standards
 
How-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic DocumentsHow-to: 18 Ways to Secure Your Electronic Documents
How-to: 18 Ways to Secure Your Electronic Documents
 
Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!Security Scare - Cybersecurity & What to Do About It!
Security Scare - Cybersecurity & What to Do About It!
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 

Best Practices For Information Security Management 2011