Your SlideShare is downloading. ×
0
A User's Guide to Data Security and Control
A User's Guide to Data Security and Control
A User's Guide to Data Security and Control
A User's Guide to Data Security and Control
A User's Guide to Data Security and Control
A User's Guide to Data Security and Control
A User's Guide to Data Security and Control
A User's Guide to Data Security and Control
A User's Guide to Data Security and Control
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

A User's Guide to Data Security and Control

933

Published on

Data Security is the subject of renewed focus following numerous high profile leaks on customer information.<br /><br />This presentation is intended as a basic training package to aid in …

Data Security is the subject of renewed focus following numerous high profile leaks on customer information.<br /><br />This presentation is intended as a basic training package to aid in ensuring that users understand the critical importance of protecting sensitive data.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
933
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. A User's Guide to Data Security and Control Copyright © 2010 Virya Technologies A Basic Guide to the Importance of Data Security and Control
  • 2. A User's Guide to Data Security and Control Data Security is the subject of renewed focus within many areas of the population. As a result, the potential cost of any loss can be very substantial.
  • 3. A User's Guide to Data Security and Control <ul><li>Sensitive Data can take many forms; </li></ul><ul><ul><ul><li>Customer Information </li></ul></ul></ul><ul><ul><ul><li>Employee Information </li></ul></ul></ul><ul><ul><ul><li>Commercially Sensitive </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Contract Information </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Product Information </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Results of Research </li></ul></ul></ul></ul></ul><ul><ul><ul><li>Government Controlled Information </li></ul></ul></ul>
  • 4. A User's Guide to Data Security and Control <ul><li>As well as being protected by the terms of your employment contract, sensitive data may be protected by law; </li></ul><ul><ul><ul><li>The Data Protection Act 1998 </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Losses punishable by a fine of up to £500,000 </li></ul></ul></ul></ul></ul><ul><ul><ul><li>The Official Secrets Act 1989 </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Unauthorised Disclosure may result in a custodial sentence </li></ul></ul></ul></ul></ul>
  • 5. A User's Guide to Data Security and Control <ul><li>Loss of sensitive data may also cause harm to the business; </li></ul><ul><ul><ul><li>Loss of reputation </li></ul></ul></ul><ul><ul><ul><li>Destruction of customer trust </li></ul></ul></ul><ul><ul><ul><li>Competitors may become privy to confidential product information </li></ul></ul></ul><ul><ul><ul><li>Loss of Business </li></ul></ul></ul><ul><ul><ul><li>Large Financial Penalties </li></ul></ul></ul>
  • 6. A User's Guide to Data Security and Control <ul><li>Data losses may occur as the result of; </li></ul><ul><li>Lost/Stolen Laptops </li></ul><ul><li>Lost/Stolen Removeable Media </li></ul><ul><li>Intercepted unencrypted communications (e-mail, fax, FTP etc) </li></ul><ul><li>'Oversharing' of Information </li></ul>
  • 7. A User's Guide to Data Security and Control <ul><li>Preventing Data Loss; </li></ul><ul><ul><ul><li>All sensitive data should be encrypted </li></ul></ul></ul><ul><ul><ul><li>Extra care should be taken with removable media </li></ul></ul></ul><ul><ul><ul><li>Only send the information that the recipient needs and is authorised to view </li></ul></ul></ul><ul><ul><ul><li>Use the most appropriate communication tool for the data required (i.e. Recorded courier rather than e-mail) </li></ul></ul></ul>
  • 8. A User's Guide to Data Security and Control <ul><li>Key Facts; </li></ul><ul><li>In a 2010 study by BlockMaster </li></ul><ul><ul><ul><li>58% of users considered a broken laptop more concerning than data loss </li></ul></ul></ul><ul><ul><ul><li>30% were more concerned with whether or not they would be snowed in overnight </li></ul></ul></ul><ul><ul><ul><li>42% were more concerned about losing christmas presents </li></ul></ul></ul><ul><li>Loss of data could cost your employer £500,000. A broken laptop may cost just £1000. </li></ul>
  • 9. A User's Guide to Data Security and Control Advanced Training Packages available from Virya Technologies HTTP://WWW.VIRYATECHNOLOGIES.COM

×