SlideShare a Scribd company logo
1 of 6
Confidentiality is the concept of ensuring that data is not made
available or disclosed to unauthorized people.
Confidentiality of data is accomplished by using strong encryption
algorithms that cannot be easily “broken.”
Confidentiality is important when network communications are of a
sensitive nature, such as trade secrets, client information subject to
privacy laws or policies, or business strategies that depend on the element
of surprise.
Confidentially is achieved through encryption. Both symmetric and
asymmetric encryption can be used.
The loss could be expected to have a limited adverse
effect on organizational operations, organization assets or
individuals.
The data is intended for public disclosure.
For Example:
College online catalog displaying academic course
descriptions.
Publicly available campus maps(campus infrastructure)
Information in the public domain.
Student login.
Job postings
The loss could be expected to have a serious adverse
effect on organizational operations, organization assets or
individuals.
The data is not generally available to the public.
For Example:
Faculty /staff employment applications, personnel files, benefits ,
salary, birth date, personal contact information.
Student records and admission applications.
Student attendance only staff/faculty members can view data. Student
cannot view the data.
 Internal memos and email, non-public reports, budgets, plans,
financial info
Directory containing phone numbers, email addresses, and titles
The loss could be expected to have a serious or
catastrophic adverse effect on organizational operations,
organization assets or individuals.
Protection of the data is required by law/regulation.
For Example:
In controller office only staff can maintenance data
confidentiality(i.e. question paper information) students not
allowed to that place.
Application that stored campus network node information.
Application collecting personal information or donor, alumnus,
or other individual.
Application that processes credit card payments.
Confidentiality

More Related Content

Similar to Confidentiality

Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
Nicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security background
Nicholas Davis
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
VITNetflix
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentation
brentcarey
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
Michael Annis
 

Similar to Confidentiality (20)

Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...
 
Data Anonymization Process Challenges and Context Missions
Data Anonymization Process Challenges and Context MissionsData Anonymization Process Challenges and Context Missions
Data Anonymization Process Challenges and Context Missions
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 
Aim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethicsAim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethics
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
Data Protection: We\'re In This Together
Data Protection: We\'re In This TogetherData Protection: We\'re In This Together
Data Protection: We\'re In This Together
 
An ethical approach to data privacy protection
An ethical approach to data privacy protectionAn ethical approach to data privacy protection
An ethical approach to data privacy protection
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentation
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
Enhanced Cryptographic Solution for Security Issues Faced by Saudi Arabian un...
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 

Recently uploaded

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 

Recently uploaded (20)

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 

Confidentiality

  • 1.
  • 2. Confidentiality is the concept of ensuring that data is not made available or disclosed to unauthorized people. Confidentiality of data is accomplished by using strong encryption algorithms that cannot be easily “broken.” Confidentiality is important when network communications are of a sensitive nature, such as trade secrets, client information subject to privacy laws or policies, or business strategies that depend on the element of surprise. Confidentially is achieved through encryption. Both symmetric and asymmetric encryption can be used.
  • 3. The loss could be expected to have a limited adverse effect on organizational operations, organization assets or individuals. The data is intended for public disclosure. For Example: College online catalog displaying academic course descriptions. Publicly available campus maps(campus infrastructure) Information in the public domain. Student login. Job postings
  • 4. The loss could be expected to have a serious adverse effect on organizational operations, organization assets or individuals. The data is not generally available to the public. For Example: Faculty /staff employment applications, personnel files, benefits , salary, birth date, personal contact information. Student records and admission applications. Student attendance only staff/faculty members can view data. Student cannot view the data.  Internal memos and email, non-public reports, budgets, plans, financial info Directory containing phone numbers, email addresses, and titles
  • 5. The loss could be expected to have a serious or catastrophic adverse effect on organizational operations, organization assets or individuals. Protection of the data is required by law/regulation. For Example: In controller office only staff can maintenance data confidentiality(i.e. question paper information) students not allowed to that place. Application that stored campus network node information. Application collecting personal information or donor, alumnus, or other individual. Application that processes credit card payments.