A User's Guide to Data Security and Control
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

A User's Guide to Data Security and Control

on

  • 1,250 views

Data Security is the subject of renewed focus following numerous high profile leaks on customer information.<br /><br />This presentation is intended as a basic training package to aid in ...

Data Security is the subject of renewed focus following numerous high profile leaks on customer information.<br /><br />This presentation is intended as a basic training package to aid in ensuring that users understand the critical importance of protecting sensitive data.

Statistics

Views

Total Views
1,250
Views on SlideShare
1,250
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

A User's Guide to Data Security and Control Presentation Transcript

  • 1. A User's Guide to Data Security and Control Copyright © 2010 Virya Technologies A Basic Guide to the Importance of Data Security and Control
  • 2. A User's Guide to Data Security and Control Data Security is the subject of renewed focus within many areas of the population. As a result, the potential cost of any loss can be very substantial.
  • 3. A User's Guide to Data Security and Control
    • Sensitive Data can take many forms;
        • Customer Information
        • Employee Information
        • Commercially Sensitive
            • Contract Information
            • Product Information
            • Results of Research
        • Government Controlled Information
  • 4. A User's Guide to Data Security and Control
    • As well as being protected by the terms of your employment contract, sensitive data may be protected by law;
        • The Data Protection Act 1998
            • Losses punishable by a fine of up to £500,000
        • The Official Secrets Act 1989
            • Unauthorised Disclosure may result in a custodial sentence
  • 5. A User's Guide to Data Security and Control
    • Loss of sensitive data may also cause harm to the business;
        • Loss of reputation
        • Destruction of customer trust
        • Competitors may become privy to confidential product information
        • Loss of Business
        • Large Financial Penalties
  • 6. A User's Guide to Data Security and Control
    • Data losses may occur as the result of;
    • Lost/Stolen Laptops
    • Lost/Stolen Removeable Media
    • Intercepted unencrypted communications (e-mail, fax, FTP etc)
    • 'Oversharing' of Information
  • 7. A User's Guide to Data Security and Control
    • Preventing Data Loss;
        • All sensitive data should be encrypted
        • Extra care should be taken with removable media
        • Only send the information that the recipient needs and is authorised to view
        • Use the most appropriate communication tool for the data required (i.e. Recorded courier rather than e-mail)
  • 8. A User's Guide to Data Security and Control
    • Key Facts;
    • In a 2010 study by BlockMaster
        • 58% of users considered a broken laptop more concerning than data loss
        • 30% were more concerned with whether or not they would be snowed in overnight
        • 42% were more concerned about losing christmas presents
    • Loss of data could cost your employer £500,000. A broken laptop may cost just £1000.
  • 9. A User's Guide to Data Security and Control Advanced Training Packages available from Virya Technologies HTTP://WWW.VIRYATECHNOLOGIES.COM