SlideShare a Scribd company logo
1 of 49
1
1
PRINCIPLES
OF
PHYSICAL SECURITY AND MANAGEMENT
2
3
PERSONNEL & DOCUMENTATION
SECURITY
Personnel security plays a crucial role in
organizations for various reasons. Its
primary purpose is to safeguard the
organization, its employees, and its assets
by ensuring that individuals with access to
sensitive information or critical roles are
trustworthy, reliable, and have the
organization's best interests at heart.
3
Personnel security
Keselamatan Kakitangan/
Anggota-anggota Syarikat
Keselamatan kakitangan memainkan peranan
penting dalam organisasi atas pelbagai sebab.
Tujuan utamanya adalah untuk melindungi
organisasi, pekerjanya dan asetnya dengan
memastikan individu yang mempunyai akses
kepada maklumat sensitif atau peranan kritikal
boleh dipercayai dan mengutamakan
kepentingan terbaik organisasi.
4
Key aspects, methods, benefits, and negative implications of
personnel security in organizations:
Significance and Purpose of Personnel Security:
• Protection of Assets: Personnel security helps protect
physical, intellectual, and financial assets, such as
proprietary information, trade secrets, equipment, and
funds, from theft, espionage, or misuse.
• Mitigating Insider Threats: It helps identify and
prevent potential insider threats, including data
breaches, fraud, and sabotage, by ensuring that
employees have the organization's trust.
5
Aspek utama, kaedah, faedah dan implikasi
negatif keselamatan kakitangan dalam organisasi:
6
Perlindungan Aset: Keselamatan
kakitangan membantu melindungi aset
fizikal, intelek dan kewangan, seperti
maklumat proprietari, rahsia
perdagangan, peralatan dan dana,
daripada kecurian, pengintipan atau
penyalahgunaan.
Mengurangkan Ancaman Orang Dalaman:
Ia membantu mengenal pasti dan
mencegah potensi ancaman orang dalam,
termasuk pelanggaran data, penipuan
dan sabotaj, dengan memastikan pekerja
mendapat kepercayaan organisasi
• Maintaining a Safe Work Environment: Personnel
security measures contribute to creating a safe work
environment by screening individuals to identify
those who may pose risks to colleagues or the
organization.
• Compliance: It helps organizations comply with
legal and regulatory requirements related to
employee background checks and data protection.
• Maintaining Reputation: Ensuring the integrity of
employees helps maintain the organization's
reputation and credibility, which can be crucial for
customer trust and investor confidence.
7
• Mengekalkan Persekitaran Kerja yang Selamat: Langkah keselamatan kakitangan
menyumbang kepada mewujudkan persekitaran kerja yang selamat dengan menyaring
individu untuk mengenal pasti mereka yang mungkin menimbulkan risiko kepada rakan
sekerja atau organisasi.
• Pematuhan: Ia membantu organisasi mematuhi keperluan undang-undang dan
peraturan yang berkaitan dengan pemeriksaan latar belakang pekerja dan perlindungan
data.
• Mengekalkan Reputasi: Memastikan integriti pekerja membantu mengekalkan reputasi
dan kredibiliti organisasi, yang boleh menjadi penting untuk kepercayaan pelanggan dan
keyakinan pelabur. 8
• Background Checks: HR departments
conduct background checks on potential
employees to verify their qualifications,
employment history, criminal record, and
other relevant information.
• Reference Checks: Contacting previous
employers and personal references helps
confirm an applicant's suitability for the job.
9
Methods for Ensuring Employment Security and Personnel Security:
Kaedah untuk Memastikan Keselamatan Pekerjaan dan Keselamatan Kakitangan:
10
Pemeriksaan Latar Belakang: Jabatan HR menjalankan semakan
latar belakang ke atas bakal pekerja untuk mengesahkan
kelayakan mereka, sejarah pekerjaan, rekod jenayah dan
maklumat lain yang berkaitan.
Semakan Rujukan: Menghubungi majikan terdahulu dan
rujukan peribadi membantu mengesahkan kesesuaian
pemohon untuk pekerjaan itu.
• Criminal History Checks: This involves
checking an applicant's criminal record to
identify any potential risks.
• Credit Checks: In some roles, especially
those related to finance, credit checks may
be conducted to assess an individual's
financial responsibility.
• Drug Testing: Some organizations conduct
drug tests as a condition of employment,
particularly in safety-sensitive positions.
11
• Security Clearances: Certain roles may
require employees to obtain security
clearances, which involve thorough
background investigations and ongoing
monitoring.
• Training and Awareness Programs: HR
departments may implement security
training and awareness programs to
educate employees about the importance
of security and best practices.
13
Pelepasan Keselamatan: Peranan
tertentu mungkin memerlukan pekerja
mendapatkan pelepasan keselamatan,
yang melibatkan penyiasatan latar
belakang yang menyeluruh dan
pemantauan berterusan.
Program Latihan dan Kesedaran:
Jabatan HR boleh melaksanakan
latihan keselamatan dan program
kesedaran untuk mendidik pekerja
tentang kepentingan keselamatan dan
amalan terbaik.
14
• Reduced Risk: Identifying potential
threats and risks early helps organizations
proactively reduce the likelihood of
security incidents.
• Enhanced Trust: Personnel security
measures enhance trust between
employees and the organization, fostering
a positive work culture.
15
Benefits of Initiating Personnel Security:
16
Faedah Memulakan Keselamatan Kakitangan
Risiko Dikurangkan: Mengenal pasti potensi
ancaman dan risiko awal membantu organisasi
secara proaktif mengurangkan kemungkinan
insiden keselamatan.
Kepercayaan yang Dipertingkatkan: Langkah
keselamatan kakitangan meningkatkan
kepercayaan antara pekerja dan organisasi,
memupuk budaya kerja yang positif.
• Legal Compliance: It ensures that the
organization complies with legal and
regulatory requirements related to
employee screening and data protection.
• Protection of Intellectual Property:
Personnel security helps protect sensitive
intellectual property and trade secrets from
theft or espionage
17
Pematuhan Undang-undang: Ia memastikan
bahawa organisasi mematuhi keperluan undang-
undang dan peraturan yang berkaitan dengan
pemeriksaan pekerja dan perlindungan data.
Perlindungan Harta Intelek: Keselamatan
kakitangan membantu melindungi harta intelek
yang sensitif dan rahsia perdagangan daripada
kecurian atau pengintipan.
18
• Security Breaches: Failing to vet
employees properly can result in security
breaches, data leaks, or insider threats
that can have serious financial and
reputational consequences.
• Legal Consequences: Non-compliance
with legal and regulatory requirements
can lead to legal penalties and lawsuits.
19
Negative Implications of Not Initiating
Personnel Security:
Pelanggaran Peraturan Keselamatan: Gagal
memeriksa pekerja dengan betul boleh
mengakibatkan pelanggaran keselamatan,
kebocoran data atau ancaman orang dalam
yang boleh membawa akibat kewangan dan
reputasi yang serius.
Akibat Undang-undang: Ketidakpatuhan
terhadap keperluan undang-undang dan
peraturan boleh membawa kepada penalti
undang-undang dan tindakan undang-undang
di mahkamah.
20
• Damaged Reputation: Security incidents
can damage an organization's reputation
and erode trust among customers,
partners, and stakeholders.
• Loss of Intellectual Property: Failure to
implement personnel security measures
can result in the loss of critical intellectual
property, affecting the organization's
competitive advantage.
21
• Reputasi Tercemar/Rosak: Insiden
keselamatan boleh merosakkan
reputasi organisasi dan menghakis
kepercayaan di kalangan pelanggan,
rakan kongsi dan pihak
berkepentingan.Kehilangan
• Harta Intelek: Kegagalan untuk
melaksanakan langkah keselamatan
kakitangan boleh mengakibatkan
kehilangan harta intelek yang kritikal,
menjejaskan kelebihan daya saing
organisasi.
22
• Safety Concerns: A lack of personnel
security can pose safety risks to employees
and the workplace.
• Productivity Loss: Dealing with security
incidents and their aftermath can divert
resources and impact productivity
23
24
Kebimbangan Keselamatan: Kekurangan
keselamatan kakitangan boleh menimbulkan
risiko keselamatan kepada pekerja dan tempat
kerja.
Kehilangan Produktiviti: Menangani insiden
keselamatan dan akibatnya boleh
mengalihkan sumber dan memberi kesan
kepada produktiviti
In conclusion, personnel security is a critical aspect
of organizational security that helps protect
assets, mitigate insider threats, and maintain a
safe and trusted work environment.
Properly implemented personnel security
measures contribute to an organization's success
by reducing risks and enhancing trust, while
neglecting it can lead to security breaches, legal
consequences, and reputational damage.
25
Conclusion:
• Kesimpulannya:
• Keselamatan kakitangan ialah aspek kritikal
keselamatan organisasi yang membantu
melindungi aset, mengurangkan ancaman orang
dalam dan mengekalkan persekitaran kerja yang
selamat dan dipercayai.
• Langkah keselamatan kakitangan yang
dilaksanakan dengan betul menyumbang
kepada kejayaan organisasi dengan
mengurangkan risiko dan meningkatkan
kepercayaan, sementara mengabaikannya boleh
membawa kepada pelanggaran keselamatan,
akibat undang-undang dan kerosakan reputasi.
26
27
Video: Cyber Phishing
• Document security is of paramount
importance in organizations for
several reasons. Its primary purpose is
to protect sensitive information,
maintain confidentiality, and ensure
the integrity and availability of
documents. Here are the significance,
methods, benefits, negative
implications, and other relevant
information regarding document
security in organizations:
28
Document Security
Adalah amat penting dalam organisasi atas
beberapa sebab. Tujuan utamanya adalah
untuk melindungi maklumat sensitif,
mengekalkan kerahsiaan, dan memastikan
integriti dan ketersediaan dokumen.
Berikut ialah kepentingan, kaedah, faedah,
implikasi negatif dan maklumat lain yang
berkaitan berkenaan keselamatan dokumen
dalam organisasi:
29
Keselamatan Dokumen:
• Protection of Sensitive Information:
Document security safeguards
sensitive and confidential information,
such as trade secrets, financial data,
customer records, and proprietary
documents, from unauthorized access
or disclosure.
• Compliance: It helps organizations
comply with legal and regulatory
requirements related to data
protection, privacy, and information
security.
30
Significance and Purpose of Document Security:
• Perlindungan Maklumat Sensitif:
Keselamatan dokumen melindungi
maklumat sensitif dan sulit, seperti rahsia
perdagangan, data kewangan, rekod
pelanggan dan dokumen proprietari,
daripada akses atau pendedahan yang tidak
dibenarkan.
• Pematuhan: Ia membantu organisasi
mematuhi keperluan undang-undang dan
peraturan yang berkaitan dengan
perlindungan data, privasi dan keselamatan
maklumat.
32
• Prevention of Data Breaches: Document
security measures mitigate the risk of data
breaches, which can result in financial losses,
legal consequences, and reputational damage.
• Preservation of Intellectual Property: By
protecting documents containing intellectual
property, organizations safeguard their
competitive advantage and innovations.
• Maintaining Trust: Document security helps
maintain the trust of clients, customers,
partners, and stakeholders who expect their
sensitive information to be handled responsibly.
33
34
Pencegahan Perosakan Data: Langkah keselamatan
dokumen mengurangkan risiko perosakan data,
yang boleh mengakibatkan kerugian kewangan,
akibat undang-undang dan kerosakan reputasi.
Pemeliharaan Harta Intelek: Dengan melindungi
dokumen yang mengandungi harta intelek,
organisasi melindungi kelebihan daya saing dan
inovasi mereka.
Mengekalkan Amanah: Keselamatan dokumen
membantu mengekalkan kepercayaan pelanggan,
pelanggan, rakan kongsi dan pihak berkepentingan
yang mengharapkan maklumat sensitif mereka
dikendalikan dengan penuh tanggungjawab.
Methods for Ensuring Information
and Document Security:
• Access Control: Implement access
controls, including user authentication
and authorization, to ensure that only
authorized individuals can access
sensitive documents.
• Encryption: Encrypt sensitive
documents both in storage and during
transmission to protect them from
unauthorized access.
• Regular Backups: Regularly back up
critical documents to prevent data loss in
case of accidental deletion, corruption,
or cyberattacks.
35
• Kawalan Akses: Laksanakan kawalan
akses, termasuk pengesahan dan
kebenaran pengguna, untuk memastikan
bahawa hanya individu yang diberi kuasa
boleh mengakses dokumen sensitif.
• Penyulitan: Sulitkan dokumen sensitif
dalam storan dan semasa penghantaran
untuk melindunginya daripada akses yang
tidak dibenarkan.
• Sandaran Biasa: Sentiasa sandarkan
dokumen kritikal untuk mengelakkan
kehilangan data sekiranya berlaku
pemadaman tidak sengaja, rasuah atau
serangan siber.
36
• Document Classification: Categorize
documents based on their sensitivity and
apply appropriate security measures
accordingly.
• Document Tracking: Use document
tracking and audit trails to monitor who
accesses, modifies, or shares documents.
• Password Protection: Secure documents
with strong passwords or passphrases, and
educate employees on the importance of
password security.
37
38
Klasifikasi Dokumen: Kategorikan dokumen
berdasarkan sensitivitinya dan gunakan langkah
keselamatan yang sesuai dengan
sewajarnya.Penjejakan Dokumen: Gunakan
penjejakan dokumen dan jejak audit untuk
memantau orang yang mengakses, mengubah suai
atau berkongsi dokumen.
Perlindungan Kata Laluan: Lindungi dokumen
dengan kata laluan atau frasa laluan yang kukuh,
dan mendidik pekerja tentang kepentingan
keselamatan kata laluan
• Data Loss Prevention (DLP) Tools:
Employ DLP tools to monitor and
prevent the unauthorized sharing of
sensitive information.
• Secure Printing: Implement secure
printing solutions to ensure that
confidential documents are not left
unattended at printers.
• Employee Training: Train employees
on best practices for document
security, including phishing awareness
and safe document handling.
39
40
Alat Pencegahan Kehilangan Data : Gunakan
alat tersebut untuk memantau dan
menghalang perkongsian maklumat sensitif
tanpa kebenaran.
Pencetakan Selamat: Laksanakan penyelesaian
percetakan selamat untuk memastikan
dokumen sulit tidak ditinggalkan tanpa
pengawasan di pencetak.
Latihan Pekerja: Latih pekerja tentang amalan
terbaik untuk keselamatan dokumen, termasuk
kesedaran pancingan data dan pengendalian
dokumen yang selamat.
• Data Protection: Ensuring document security
protects sensitive data from breaches and
cyberattacks.
• Legal Compliance: It helps organizations comply
with data protection laws, reducing the risk of legal
consequences.
• Trust and Reputation: Document security
measures build trust with clients and stakeholders
and safeguard the organization's reputation.
• Competitive Advantage: Protecting intellectual
property and proprietary documents maintains a
competitive edge.
41
Benefits of Initiating Information and Document Security:
• Perlindungan Data: Memastikan keselamatan
dokumen melindungi data sensitif daripada
pelanggaran dan serangan siber.
• Pematuhan Undang-undang: Ia membantu
organisasi mematuhi undang-undang
perlindungan data, mengurangkan risiko akibat
undang-undang.
• Kepercayaan dan Reputasi: Dokumen langkah
keselamatan membina kepercayaan dengan
pelanggan dan pihak berkepentingan serta
menjaga reputasi organisasi.
• Kelebihan Daya Saing: Melindungi harta intelek
dan dokumen proprietari mengekalkan kelebihan
daya saing.
42
• Data Breaches: Failure to secure
documents can lead to data breaches,
exposing sensitive information and
damaging the organization's reputation.
• Legal Consequences: Non-compliance
with data protection laws can result in
hefty fines, legal actions, and regulatory
penalties.
• Loss of Trust: Document security
incidents erode trust among clients,
customers, and partners.
43
Negative Implications of Not Initiating Information
and Document Security:
44
Kerosakan Data: Kegagalan untuk menjaga
dokumen boleh menyebabkan kerosakan
data, mendedahkan maklumat sensitif dan
merosakkan reputasi organisasi.
Akibat Undang-undang: Ketidakpatuhan
terhadap undang-undang perlindungan
data boleh mengakibatkan denda yang
besar, tindakan undang-undang dan
penalti kawal selia.
Kehilangan Kepercayaan: Insiden
keselamatan dokumen menghakis
kepercayaan di kalangan pelanggan,
pelanggan dan rakan kongsi.
• Financial Loss: Data breaches can result
in financial losses due to litigation costs,
fines, and loss of business.
• Reputational Damage: Security
incidents can have long-lasting
reputational damage that affects an
organization's bottom line.
• Loss of Intellectual Property: Failure to
secure intellectual property can lead to
theft or unauthorized use by competitors.
45
• Kerugian Kewangan: Kerosakan data
boleh mengakibatkan kerugian
kewangan akibat kos litigasi, denda dan
kerugian perniagaan.
• Kerosakan Reputasi: Insiden
keselamatan boleh menyebabkan
kerosakan reputasi berpanjangan yang
menjejaskan keuntungan organisasi.
• Kehilangan Harta Intelek: Kegagalan
untuk mendapatkan harta intelek
boleh menyebabkan kecurian atau
penggunaan tanpa kebenaran oleh
pesaing.
46
Conclusion
• In conclusion, document security is
crucial for protecting sensitive
information, complying with regulations,
maintaining trust, and safeguarding an
organization's reputation. Properly
implemented document security
measures reduce the risk of data
breaches and their associated negative
consequences, while neglecting them
can lead to significant financial, legal,
and reputational challenges.
47
48
Kesimpulannya, keselamatan dokumen adalah
penting untuk melindungi maklumat sensitif,
mematuhi peraturan, mengekalkan
kepercayaan dan menjaga reputasi organisasi.
Langkah keselamatan dokumen yang
dilaksanakan dengan betul mengurangkan
risiko pelanggaran data dan akibat negatif yang
berkaitan, sementara pengabaian mereka
boleh membawa kepada cabaran kewangan,
undang-undang dan reputasi yang ketara.
Kesimpulan
49
49
End of Session
49

More Related Content

Similar to BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security

1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmt
madunix
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
AbuHanifah59
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
Anne Starr
 

Similar to BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security (20)

4 Operations Security
4 Operations Security4 Operations Security
4 Operations Security
 
1 info sec+risk-mgmt
1 info sec+risk-mgmt1 info sec+risk-mgmt
1 info sec+risk-mgmt
 
Importance of Information Security and Goals for Preventing Data Breaches
 Importance of Information Security and Goals for Preventing Data Breaches Importance of Information Security and Goals for Preventing Data Breaches
Importance of Information Security and Goals for Preventing Data Breaches
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Identity Management Controls.pdf
Identity Management Controls.pdfIdentity Management Controls.pdf
Identity Management Controls.pdf
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
For_HRMD_Personnel_Security.doc
For_HRMD_Personnel_Security.docFor_HRMD_Personnel_Security.doc
For_HRMD_Personnel_Security.doc
 
An Overview of HR Investigations - Building a Fair and Safe Workplace.pdf
An Overview of HR Investigations - Building a Fair and Safe Workplace.pdfAn Overview of HR Investigations - Building a Fair and Safe Workplace.pdf
An Overview of HR Investigations - Building a Fair and Safe Workplace.pdf
 
Security Culture
Security CultureSecurity Culture
Security Culture
 
The Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdfThe Importance of Physical Security Safeguarding Your Assets.pdf
The Importance of Physical Security Safeguarding Your Assets.pdf
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Should You Conduct a Background Screening Before Promoting Employees
Should You Conduct a Background Screening Before Promoting EmployeesShould You Conduct a Background Screening Before Promoting Employees
Should You Conduct a Background Screening Before Promoting Employees
 
CISSPills #3.06
CISSPills #3.06CISSPills #3.06
CISSPills #3.06
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
The Critical Role of Background Verification in the BFSI Sector | TraQSuite
The Critical Role of Background Verification in the BFSI Sector | TraQSuiteThe Critical Role of Background Verification in the BFSI Sector | TraQSuite
The Critical Role of Background Verification in the BFSI Sector | TraQSuite
 
Human Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptxHuman Factors_MODULE_2.pptx
Human Factors_MODULE_2.pptx
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Physical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs ItPhysical Security - Why Your Business Needs It
Physical Security - Why Your Business Needs It
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 

More from Major K. Subramaniam Kmaravehlu

More from Major K. Subramaniam Kmaravehlu (20)

TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
TRAINING PEDAGOGY.ppt Introduction to Understanding of Pedagogy.
 
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITYPSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
PSM NOTES.pptx FOR BEGINNERS WANTING TO UNDERSTAND PHYSICAL SECURITY
 
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.pptu2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
 
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSMBLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
 
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
 
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning GuideBLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
 
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareAI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
 
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesAVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
 
CTPAT PPTX Presentation.pptx - minimum security
CTPAT  PPTX Presentation.pptx - minimum securityCTPAT  PPTX Presentation.pptx - minimum security
CTPAT PPTX Presentation.pptx - minimum security
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
Physical_Security_Historical_perspective.ppt
Physical_Security_Historical_perspective.pptPhysical_Security_Historical_perspective.ppt
Physical_Security_Historical_perspective.ppt
 
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSIONBLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
 
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONBLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
 
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesxBLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
CTPAT-MSR.pptx- Presentation Slides for trainees
CTPAT-MSR.pptx- Presentation Slides for traineesCTPAT-MSR.pptx- Presentation Slides for trainees
CTPAT-MSR.pptx- Presentation Slides for trainees
 
DLE 1013-ISM REV.pptx - This note covers 20 over slides
DLE 1013-ISM REV.pptx - This note covers 20 over slidesDLE 1013-ISM REV.pptx - This note covers 20 over slides
DLE 1013-ISM REV.pptx - This note covers 20 over slides
 

Recently uploaded

obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
yulianti213969
 
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Klinik kandungan
 
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
bleessingsbender
 
Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312
LR1709MUSIC
 

Recently uploaded (20)

HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
JHANSI CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JHANSI ESCORTS SERVICE PROVIDE
JHANSI CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JHANSI ESCORTS SERVICE PROVIDEJHANSI CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JHANSI ESCORTS SERVICE PROVIDE
JHANSI CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JHANSI ESCORTS SERVICE PROVIDE
 
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxThompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxA DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptx
 
UJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDE
UJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDEUJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDE
UJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDE
 
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
obat aborsi bandung wa 081336238223 jual obat aborsi cytotec asli di bandung9...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Pitch Deck Teardown: Goodcarbon's $5.5m Seed deck
Pitch Deck Teardown: Goodcarbon's $5.5m Seed deckPitch Deck Teardown: Goodcarbon's $5.5m Seed deck
Pitch Deck Teardown: Goodcarbon's $5.5m Seed deck
 
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDEJIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
JIND CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JIND ESCORTS SERVICE PROVIDE
 
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
 
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDEGURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
 
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
Abortion pills in Jeddah ! +27737758557, cytotec pill riyadh. Saudi Arabia" A...
 
Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
JAJPUR CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JAJPUR ESCORTS SERVICE PROVIDE
JAJPUR CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JAJPUR  ESCORTS SERVICE PROVIDEJAJPUR CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JAJPUR  ESCORTS SERVICE PROVIDE
JAJPUR CALL GIRL ❤ 8272964427❤ CALL GIRLS IN JAJPUR ESCORTS SERVICE PROVIDE
 
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfThe Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
 
Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024
 
Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312Shots fired Budget Presentation.pdf12312
Shots fired Budget Presentation.pdf12312
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 

BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security

  • 3. Personnel security plays a crucial role in organizations for various reasons. Its primary purpose is to safeguard the organization, its employees, and its assets by ensuring that individuals with access to sensitive information or critical roles are trustworthy, reliable, and have the organization's best interests at heart. 3 Personnel security
  • 4. Keselamatan Kakitangan/ Anggota-anggota Syarikat Keselamatan kakitangan memainkan peranan penting dalam organisasi atas pelbagai sebab. Tujuan utamanya adalah untuk melindungi organisasi, pekerjanya dan asetnya dengan memastikan individu yang mempunyai akses kepada maklumat sensitif atau peranan kritikal boleh dipercayai dan mengutamakan kepentingan terbaik organisasi. 4
  • 5. Key aspects, methods, benefits, and negative implications of personnel security in organizations: Significance and Purpose of Personnel Security: • Protection of Assets: Personnel security helps protect physical, intellectual, and financial assets, such as proprietary information, trade secrets, equipment, and funds, from theft, espionage, or misuse. • Mitigating Insider Threats: It helps identify and prevent potential insider threats, including data breaches, fraud, and sabotage, by ensuring that employees have the organization's trust. 5
  • 6. Aspek utama, kaedah, faedah dan implikasi negatif keselamatan kakitangan dalam organisasi: 6 Perlindungan Aset: Keselamatan kakitangan membantu melindungi aset fizikal, intelek dan kewangan, seperti maklumat proprietari, rahsia perdagangan, peralatan dan dana, daripada kecurian, pengintipan atau penyalahgunaan. Mengurangkan Ancaman Orang Dalaman: Ia membantu mengenal pasti dan mencegah potensi ancaman orang dalam, termasuk pelanggaran data, penipuan dan sabotaj, dengan memastikan pekerja mendapat kepercayaan organisasi
  • 7. • Maintaining a Safe Work Environment: Personnel security measures contribute to creating a safe work environment by screening individuals to identify those who may pose risks to colleagues or the organization. • Compliance: It helps organizations comply with legal and regulatory requirements related to employee background checks and data protection. • Maintaining Reputation: Ensuring the integrity of employees helps maintain the organization's reputation and credibility, which can be crucial for customer trust and investor confidence. 7
  • 8. • Mengekalkan Persekitaran Kerja yang Selamat: Langkah keselamatan kakitangan menyumbang kepada mewujudkan persekitaran kerja yang selamat dengan menyaring individu untuk mengenal pasti mereka yang mungkin menimbulkan risiko kepada rakan sekerja atau organisasi. • Pematuhan: Ia membantu organisasi mematuhi keperluan undang-undang dan peraturan yang berkaitan dengan pemeriksaan latar belakang pekerja dan perlindungan data. • Mengekalkan Reputasi: Memastikan integriti pekerja membantu mengekalkan reputasi dan kredibiliti organisasi, yang boleh menjadi penting untuk kepercayaan pelanggan dan keyakinan pelabur. 8
  • 9. • Background Checks: HR departments conduct background checks on potential employees to verify their qualifications, employment history, criminal record, and other relevant information. • Reference Checks: Contacting previous employers and personal references helps confirm an applicant's suitability for the job. 9 Methods for Ensuring Employment Security and Personnel Security:
  • 10. Kaedah untuk Memastikan Keselamatan Pekerjaan dan Keselamatan Kakitangan: 10 Pemeriksaan Latar Belakang: Jabatan HR menjalankan semakan latar belakang ke atas bakal pekerja untuk mengesahkan kelayakan mereka, sejarah pekerjaan, rekod jenayah dan maklumat lain yang berkaitan. Semakan Rujukan: Menghubungi majikan terdahulu dan rujukan peribadi membantu mengesahkan kesesuaian pemohon untuk pekerjaan itu.
  • 11. • Criminal History Checks: This involves checking an applicant's criminal record to identify any potential risks. • Credit Checks: In some roles, especially those related to finance, credit checks may be conducted to assess an individual's financial responsibility. • Drug Testing: Some organizations conduct drug tests as a condition of employment, particularly in safety-sensitive positions. 11
  • 12.
  • 13. • Security Clearances: Certain roles may require employees to obtain security clearances, which involve thorough background investigations and ongoing monitoring. • Training and Awareness Programs: HR departments may implement security training and awareness programs to educate employees about the importance of security and best practices. 13
  • 14. Pelepasan Keselamatan: Peranan tertentu mungkin memerlukan pekerja mendapatkan pelepasan keselamatan, yang melibatkan penyiasatan latar belakang yang menyeluruh dan pemantauan berterusan. Program Latihan dan Kesedaran: Jabatan HR boleh melaksanakan latihan keselamatan dan program kesedaran untuk mendidik pekerja tentang kepentingan keselamatan dan amalan terbaik. 14
  • 15. • Reduced Risk: Identifying potential threats and risks early helps organizations proactively reduce the likelihood of security incidents. • Enhanced Trust: Personnel security measures enhance trust between employees and the organization, fostering a positive work culture. 15 Benefits of Initiating Personnel Security:
  • 16. 16 Faedah Memulakan Keselamatan Kakitangan Risiko Dikurangkan: Mengenal pasti potensi ancaman dan risiko awal membantu organisasi secara proaktif mengurangkan kemungkinan insiden keselamatan. Kepercayaan yang Dipertingkatkan: Langkah keselamatan kakitangan meningkatkan kepercayaan antara pekerja dan organisasi, memupuk budaya kerja yang positif.
  • 17. • Legal Compliance: It ensures that the organization complies with legal and regulatory requirements related to employee screening and data protection. • Protection of Intellectual Property: Personnel security helps protect sensitive intellectual property and trade secrets from theft or espionage 17
  • 18. Pematuhan Undang-undang: Ia memastikan bahawa organisasi mematuhi keperluan undang- undang dan peraturan yang berkaitan dengan pemeriksaan pekerja dan perlindungan data. Perlindungan Harta Intelek: Keselamatan kakitangan membantu melindungi harta intelek yang sensitif dan rahsia perdagangan daripada kecurian atau pengintipan. 18
  • 19. • Security Breaches: Failing to vet employees properly can result in security breaches, data leaks, or insider threats that can have serious financial and reputational consequences. • Legal Consequences: Non-compliance with legal and regulatory requirements can lead to legal penalties and lawsuits. 19 Negative Implications of Not Initiating Personnel Security:
  • 20. Pelanggaran Peraturan Keselamatan: Gagal memeriksa pekerja dengan betul boleh mengakibatkan pelanggaran keselamatan, kebocoran data atau ancaman orang dalam yang boleh membawa akibat kewangan dan reputasi yang serius. Akibat Undang-undang: Ketidakpatuhan terhadap keperluan undang-undang dan peraturan boleh membawa kepada penalti undang-undang dan tindakan undang-undang di mahkamah. 20
  • 21. • Damaged Reputation: Security incidents can damage an organization's reputation and erode trust among customers, partners, and stakeholders. • Loss of Intellectual Property: Failure to implement personnel security measures can result in the loss of critical intellectual property, affecting the organization's competitive advantage. 21
  • 22. • Reputasi Tercemar/Rosak: Insiden keselamatan boleh merosakkan reputasi organisasi dan menghakis kepercayaan di kalangan pelanggan, rakan kongsi dan pihak berkepentingan.Kehilangan • Harta Intelek: Kegagalan untuk melaksanakan langkah keselamatan kakitangan boleh mengakibatkan kehilangan harta intelek yang kritikal, menjejaskan kelebihan daya saing organisasi. 22
  • 23. • Safety Concerns: A lack of personnel security can pose safety risks to employees and the workplace. • Productivity Loss: Dealing with security incidents and their aftermath can divert resources and impact productivity 23
  • 24. 24 Kebimbangan Keselamatan: Kekurangan keselamatan kakitangan boleh menimbulkan risiko keselamatan kepada pekerja dan tempat kerja. Kehilangan Produktiviti: Menangani insiden keselamatan dan akibatnya boleh mengalihkan sumber dan memberi kesan kepada produktiviti
  • 25. In conclusion, personnel security is a critical aspect of organizational security that helps protect assets, mitigate insider threats, and maintain a safe and trusted work environment. Properly implemented personnel security measures contribute to an organization's success by reducing risks and enhancing trust, while neglecting it can lead to security breaches, legal consequences, and reputational damage. 25 Conclusion:
  • 26. • Kesimpulannya: • Keselamatan kakitangan ialah aspek kritikal keselamatan organisasi yang membantu melindungi aset, mengurangkan ancaman orang dalam dan mengekalkan persekitaran kerja yang selamat dan dipercayai. • Langkah keselamatan kakitangan yang dilaksanakan dengan betul menyumbang kepada kejayaan organisasi dengan mengurangkan risiko dan meningkatkan kepercayaan, sementara mengabaikannya boleh membawa kepada pelanggaran keselamatan, akibat undang-undang dan kerosakan reputasi. 26
  • 28. • Document security is of paramount importance in organizations for several reasons. Its primary purpose is to protect sensitive information, maintain confidentiality, and ensure the integrity and availability of documents. Here are the significance, methods, benefits, negative implications, and other relevant information regarding document security in organizations: 28 Document Security
  • 29. Adalah amat penting dalam organisasi atas beberapa sebab. Tujuan utamanya adalah untuk melindungi maklumat sensitif, mengekalkan kerahsiaan, dan memastikan integriti dan ketersediaan dokumen. Berikut ialah kepentingan, kaedah, faedah, implikasi negatif dan maklumat lain yang berkaitan berkenaan keselamatan dokumen dalam organisasi: 29 Keselamatan Dokumen:
  • 30. • Protection of Sensitive Information: Document security safeguards sensitive and confidential information, such as trade secrets, financial data, customer records, and proprietary documents, from unauthorized access or disclosure. • Compliance: It helps organizations comply with legal and regulatory requirements related to data protection, privacy, and information security. 30 Significance and Purpose of Document Security:
  • 31.
  • 32. • Perlindungan Maklumat Sensitif: Keselamatan dokumen melindungi maklumat sensitif dan sulit, seperti rahsia perdagangan, data kewangan, rekod pelanggan dan dokumen proprietari, daripada akses atau pendedahan yang tidak dibenarkan. • Pematuhan: Ia membantu organisasi mematuhi keperluan undang-undang dan peraturan yang berkaitan dengan perlindungan data, privasi dan keselamatan maklumat. 32
  • 33. • Prevention of Data Breaches: Document security measures mitigate the risk of data breaches, which can result in financial losses, legal consequences, and reputational damage. • Preservation of Intellectual Property: By protecting documents containing intellectual property, organizations safeguard their competitive advantage and innovations. • Maintaining Trust: Document security helps maintain the trust of clients, customers, partners, and stakeholders who expect their sensitive information to be handled responsibly. 33
  • 34. 34 Pencegahan Perosakan Data: Langkah keselamatan dokumen mengurangkan risiko perosakan data, yang boleh mengakibatkan kerugian kewangan, akibat undang-undang dan kerosakan reputasi. Pemeliharaan Harta Intelek: Dengan melindungi dokumen yang mengandungi harta intelek, organisasi melindungi kelebihan daya saing dan inovasi mereka. Mengekalkan Amanah: Keselamatan dokumen membantu mengekalkan kepercayaan pelanggan, pelanggan, rakan kongsi dan pihak berkepentingan yang mengharapkan maklumat sensitif mereka dikendalikan dengan penuh tanggungjawab.
  • 35. Methods for Ensuring Information and Document Security: • Access Control: Implement access controls, including user authentication and authorization, to ensure that only authorized individuals can access sensitive documents. • Encryption: Encrypt sensitive documents both in storage and during transmission to protect them from unauthorized access. • Regular Backups: Regularly back up critical documents to prevent data loss in case of accidental deletion, corruption, or cyberattacks. 35
  • 36. • Kawalan Akses: Laksanakan kawalan akses, termasuk pengesahan dan kebenaran pengguna, untuk memastikan bahawa hanya individu yang diberi kuasa boleh mengakses dokumen sensitif. • Penyulitan: Sulitkan dokumen sensitif dalam storan dan semasa penghantaran untuk melindunginya daripada akses yang tidak dibenarkan. • Sandaran Biasa: Sentiasa sandarkan dokumen kritikal untuk mengelakkan kehilangan data sekiranya berlaku pemadaman tidak sengaja, rasuah atau serangan siber. 36
  • 37. • Document Classification: Categorize documents based on their sensitivity and apply appropriate security measures accordingly. • Document Tracking: Use document tracking and audit trails to monitor who accesses, modifies, or shares documents. • Password Protection: Secure documents with strong passwords or passphrases, and educate employees on the importance of password security. 37
  • 38. 38 Klasifikasi Dokumen: Kategorikan dokumen berdasarkan sensitivitinya dan gunakan langkah keselamatan yang sesuai dengan sewajarnya.Penjejakan Dokumen: Gunakan penjejakan dokumen dan jejak audit untuk memantau orang yang mengakses, mengubah suai atau berkongsi dokumen. Perlindungan Kata Laluan: Lindungi dokumen dengan kata laluan atau frasa laluan yang kukuh, dan mendidik pekerja tentang kepentingan keselamatan kata laluan
  • 39. • Data Loss Prevention (DLP) Tools: Employ DLP tools to monitor and prevent the unauthorized sharing of sensitive information. • Secure Printing: Implement secure printing solutions to ensure that confidential documents are not left unattended at printers. • Employee Training: Train employees on best practices for document security, including phishing awareness and safe document handling. 39
  • 40. 40 Alat Pencegahan Kehilangan Data : Gunakan alat tersebut untuk memantau dan menghalang perkongsian maklumat sensitif tanpa kebenaran. Pencetakan Selamat: Laksanakan penyelesaian percetakan selamat untuk memastikan dokumen sulit tidak ditinggalkan tanpa pengawasan di pencetak. Latihan Pekerja: Latih pekerja tentang amalan terbaik untuk keselamatan dokumen, termasuk kesedaran pancingan data dan pengendalian dokumen yang selamat.
  • 41. • Data Protection: Ensuring document security protects sensitive data from breaches and cyberattacks. • Legal Compliance: It helps organizations comply with data protection laws, reducing the risk of legal consequences. • Trust and Reputation: Document security measures build trust with clients and stakeholders and safeguard the organization's reputation. • Competitive Advantage: Protecting intellectual property and proprietary documents maintains a competitive edge. 41 Benefits of Initiating Information and Document Security:
  • 42. • Perlindungan Data: Memastikan keselamatan dokumen melindungi data sensitif daripada pelanggaran dan serangan siber. • Pematuhan Undang-undang: Ia membantu organisasi mematuhi undang-undang perlindungan data, mengurangkan risiko akibat undang-undang. • Kepercayaan dan Reputasi: Dokumen langkah keselamatan membina kepercayaan dengan pelanggan dan pihak berkepentingan serta menjaga reputasi organisasi. • Kelebihan Daya Saing: Melindungi harta intelek dan dokumen proprietari mengekalkan kelebihan daya saing. 42
  • 43. • Data Breaches: Failure to secure documents can lead to data breaches, exposing sensitive information and damaging the organization's reputation. • Legal Consequences: Non-compliance with data protection laws can result in hefty fines, legal actions, and regulatory penalties. • Loss of Trust: Document security incidents erode trust among clients, customers, and partners. 43 Negative Implications of Not Initiating Information and Document Security:
  • 44. 44 Kerosakan Data: Kegagalan untuk menjaga dokumen boleh menyebabkan kerosakan data, mendedahkan maklumat sensitif dan merosakkan reputasi organisasi. Akibat Undang-undang: Ketidakpatuhan terhadap undang-undang perlindungan data boleh mengakibatkan denda yang besar, tindakan undang-undang dan penalti kawal selia. Kehilangan Kepercayaan: Insiden keselamatan dokumen menghakis kepercayaan di kalangan pelanggan, pelanggan dan rakan kongsi.
  • 45. • Financial Loss: Data breaches can result in financial losses due to litigation costs, fines, and loss of business. • Reputational Damage: Security incidents can have long-lasting reputational damage that affects an organization's bottom line. • Loss of Intellectual Property: Failure to secure intellectual property can lead to theft or unauthorized use by competitors. 45
  • 46. • Kerugian Kewangan: Kerosakan data boleh mengakibatkan kerugian kewangan akibat kos litigasi, denda dan kerugian perniagaan. • Kerosakan Reputasi: Insiden keselamatan boleh menyebabkan kerosakan reputasi berpanjangan yang menjejaskan keuntungan organisasi. • Kehilangan Harta Intelek: Kegagalan untuk mendapatkan harta intelek boleh menyebabkan kecurian atau penggunaan tanpa kebenaran oleh pesaing. 46
  • 47. Conclusion • In conclusion, document security is crucial for protecting sensitive information, complying with regulations, maintaining trust, and safeguarding an organization's reputation. Properly implemented document security measures reduce the risk of data breaches and their associated negative consequences, while neglecting them can lead to significant financial, legal, and reputational challenges. 47
  • 48. 48 Kesimpulannya, keselamatan dokumen adalah penting untuk melindungi maklumat sensitif, mematuhi peraturan, mengekalkan kepercayaan dan menjaga reputasi organisasi. Langkah keselamatan dokumen yang dilaksanakan dengan betul mengurangkan risiko pelanggaran data dan akibat negatif yang berkaitan, sementara pengabaian mereka boleh membawa kepada cabaran kewangan, undang-undang dan reputasi yang ketara. Kesimpulan