A User's Guide to Data Security and Control

  • 291 views
Uploaded on

Data Security is the subject of renewed focus following numerous high profile leaks on customer information.This presentation is intended as a basic training package to aid in ensuring that users …

Data Security is the subject of renewed focus following numerous high profile leaks on customer information.This presentation is intended as a basic training package to aid in ensuring that users understand the critical importance of protecting sensitive data.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
291
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
2
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. A User's Guide to Data Security and Control Copyright © 2010 Virya Technologies A Basic Guide to the Importance of Data Security and Control
  • 2. A User's Guide to Data Security and Control Data Security is the subject of renewed focus within many areas of the population. As a result, the potential cost of any loss can be very substantial.
  • 3. A User's Guide to Data Security and Control
    • Sensitive Data can take many forms;
        • Customer Information
        • Employee Information
        • Commercially Sensitive
            • Contract Information
            • Product Information
            • Results of Research
        • Government Controlled Information
  • 4. A User's Guide to Data Security and Control
    • As well as being protected by the terms of your employment contract, sensitive data may be protected by law;
        • The Data Protection Act 1998
            • Losses punishable by a fine of up to £500,000
        • The Official Secrets Act 1989
            • Unauthorised Disclosure may result in a custodial sentence
  • 5. A User's Guide to Data Security and Control
    • Loss of sensitive data may also cause harm to the business;
        • Loss of reputation
        • Destruction of customer trust
        • Competitors may become privy to confidential product information
        • Loss of Business
        • Large Financial Penalties
  • 6. A User's Guide to Data Security and Control
    • Data losses may occur as the result of;
    • Lost/Stolen Laptops
    • Lost/Stolen Removeable Media
    • Intercepted unencrypted communications (e-mail, fax, FTP etc)
    • 'Oversharing' of Information
  • 7. A User's Guide to Data Security and Control
    • Preventing Data Loss;
        • All sensitive data should be encrypted
        • Extra care should be taken with removable media
        • Only send the information that the recipient needs and is authorised to view
        • Use the most appropriate communication tool for the data required (i.e. Recorded courier rather than e-mail)
  • 8. A User's Guide to Data Security and Control
    • Key Facts;
    • In a 2010 study by BlockMaster
        • 58% of users considered a broken laptop more concerning than data loss
        • 30% were more concerned with whether or not they would be snowed in overnight
        • 42% were more concerned about losing christmas presents
    • Loss of data could cost your employer £500,000. A broken laptop may cost just £1000.
  • 9. A User's Guide to Data Security and Control Advanced Training Packages available from Virya Technologies HTTP://WWW.VIRYATECHNOLOGIES.COM