A User's Guide to Data Security and Control Copyright © 2010 Virya Technologies A Basic Guide to the Importance of Data Se...
A User's Guide to Data Security and Control Data Security is the subject of renewed focus within many areas of the populat...
A User's Guide to Data Security and Control <ul><li>Sensitive Data can take many forms; </li></ul><ul><ul><ul><li>Customer...
A User's Guide to Data Security and Control <ul><li>As well as being protected by the terms of your employment contract, s...
A User's Guide to Data Security and Control <ul><li>Loss of sensitive data may also cause harm to the business; </li></ul>...
A User's Guide to Data Security and Control <ul><li>Data losses may occur as the result of; </li></ul><ul><li>Lost/Stolen ...
A User's Guide to Data Security and Control <ul><li>Preventing Data Loss; </li></ul><ul><ul><ul><li>All sensitive data sho...
A User's Guide to Data Security and Control <ul><li>Key Facts; </li></ul><ul><li>In a 2010 study by BlockMaster </li></ul>...
A User's Guide to Data Security and Control Advanced Training Packages available from Virya Technologies HTTP://WWW.VIRYAT...
Upcoming SlideShare
Loading in...5
×

A User's Guide to Data Security and Control

351

Published on

Data Security is the subject of renewed focus following numerous high profile leaks on customer information.This presentation is intended as a basic training package to aid in ensuring that users understand the critical importance of protecting sensitive data.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
351
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

A User's Guide to Data Security and Control

  1. 1. A User's Guide to Data Security and Control Copyright © 2010 Virya Technologies A Basic Guide to the Importance of Data Security and Control
  2. 2. A User's Guide to Data Security and Control Data Security is the subject of renewed focus within many areas of the population. As a result, the potential cost of any loss can be very substantial.
  3. 3. A User's Guide to Data Security and Control <ul><li>Sensitive Data can take many forms; </li></ul><ul><ul><ul><li>Customer Information </li></ul></ul></ul><ul><ul><ul><li>Employee Information </li></ul></ul></ul><ul><ul><ul><li>Commercially Sensitive </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Contract Information </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Product Information </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Results of Research </li></ul></ul></ul></ul></ul><ul><ul><ul><li>Government Controlled Information </li></ul></ul></ul>
  4. 4. A User's Guide to Data Security and Control <ul><li>As well as being protected by the terms of your employment contract, sensitive data may be protected by law; </li></ul><ul><ul><ul><li>The Data Protection Act 1998 </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Losses punishable by a fine of up to £500,000 </li></ul></ul></ul></ul></ul><ul><ul><ul><li>The Official Secrets Act 1989 </li></ul></ul></ul><ul><ul><ul><ul><ul><li>Unauthorised Disclosure may result in a custodial sentence </li></ul></ul></ul></ul></ul>
  5. 5. A User's Guide to Data Security and Control <ul><li>Loss of sensitive data may also cause harm to the business; </li></ul><ul><ul><ul><li>Loss of reputation </li></ul></ul></ul><ul><ul><ul><li>Destruction of customer trust </li></ul></ul></ul><ul><ul><ul><li>Competitors may become privy to confidential product information </li></ul></ul></ul><ul><ul><ul><li>Loss of Business </li></ul></ul></ul><ul><ul><ul><li>Large Financial Penalties </li></ul></ul></ul>
  6. 6. A User's Guide to Data Security and Control <ul><li>Data losses may occur as the result of; </li></ul><ul><li>Lost/Stolen Laptops </li></ul><ul><li>Lost/Stolen Removeable Media </li></ul><ul><li>Intercepted unencrypted communications (e-mail, fax, FTP etc) </li></ul><ul><li>'Oversharing' of Information </li></ul>
  7. 7. A User's Guide to Data Security and Control <ul><li>Preventing Data Loss; </li></ul><ul><ul><ul><li>All sensitive data should be encrypted </li></ul></ul></ul><ul><ul><ul><li>Extra care should be taken with removable media </li></ul></ul></ul><ul><ul><ul><li>Only send the information that the recipient needs and is authorised to view </li></ul></ul></ul><ul><ul><ul><li>Use the most appropriate communication tool for the data required (i.e. Recorded courier rather than e-mail) </li></ul></ul></ul>
  8. 8. A User's Guide to Data Security and Control <ul><li>Key Facts; </li></ul><ul><li>In a 2010 study by BlockMaster </li></ul><ul><ul><ul><li>58% of users considered a broken laptop more concerning than data loss </li></ul></ul></ul><ul><ul><ul><li>30% were more concerned with whether or not they would be snowed in overnight </li></ul></ul></ul><ul><ul><ul><li>42% were more concerned about losing christmas presents </li></ul></ul></ul><ul><li>Loss of data could cost your employer £500,000. A broken laptop may cost just £1000. </li></ul>
  9. 9. A User's Guide to Data Security and Control Advanced Training Packages available from Virya Technologies HTTP://WWW.VIRYATECHNOLOGIES.COM
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×