SlideShare a Scribd company logo
1 of 6
Download to read offline
Paper Review: Data Handling Guidelines
Dublin City University
Amnah Alowies Arwa Alamer
Information Security - Fall 2019
Summarized by:
Those guidelines provide the bases to people who are in charge of
protecting the data as it give them a way to handle and classify
these data.
Data Classification:
Controlled : The protection of the information is at the hand of the custodian and
there is a low risk of embarrassment or repetitional harm.
Restricted : Revelation, disclosure, loss of availability or integrity could hurt the
reputation, or may have a short negative impact on the financial aspect.
Highly Restricted : Disclosure could cause an exceptional or a long term damage to the
reputation, it could also put those whose information is disclosed at risk, or may have serious
impact or a long term negative financial circuses.
Data Handling Guidelines
these classification/activity include:
1. Access Control
2. Backup
3. Labelling
4. Physical Transfer (paper)
5. Electronic Storage
6. Electronic Transfer – Internal
7. Electronic Transfer – External
8. Disposal
9. System Controls
10.System Availability
Data Handling Guidelines
1.Access Control
Controlled : Available to all users who need these information.
Restricted : Available to authorized users only. Access should be monitored and reviewed on a
regular basis. When the access is given to a third party, a non-disclosure agreement should be
taken.
Highly Restricted : Available only to those who have an absolute requirement and authorization
for access. This requirement should be submitted in a writing form and authorized by the data
custodian.
2. Backup
Controlled : Information should be protected and secured and have a backup.
Restricted : Information should be protected by backups and put in a secure location far away
from the source data.
Highly Restricted : Information should be highly secured. Backups should be taken and checked
a nightly basis. Backups should be in a secure fire-proof- place removed from the data source.
3.Labelling
Controlled/Restricted/Highly Restricted : the labels should be used to convey the importance of
the data, e.g. Confidential or Strictly Confidential.
4.Physical Transfer (paper)
Controlled/Restricted/Highly Restricted : Data should be transfer with care when it in a physical
form.
Data Handling Guidelines
5. Electronic Storage
Controlled : Must be stored in a system that is accessible to those authorized under the access
control above.
Restricted : Must be stored in a system that is accessible to those authorized under the access
control above. Where information is held outside the source must be encrypted.
Highly Restricted : Must be stored in a system that is accessible to those authorized under the
access control above. Servers that hold the information must be held in a secure
environment.
6. Electronic Transfer – Internal
Controlled : Data should be encrypted when it necessary.
Restricted : if data is transform over wireless the data must be encrypted.
Highly Restricted : Data transfers have to be encrypted. Usb can not be use to transfer
sensitive personal data.
7. Electronic Transfer – External
Controlled : Data should be encrypted when it necessary.
Restricted : Data should be encrypted if it was emailed.
Highly Restricted :Data transfers have to be encrypted. USB can not be use to transfer
sensitive personal data. Data should be encrypted if it was emailed.
Data Handling Guidelines
8. Disposal
Controlled : Normal fashion disposal.
Restricted /Highly Restricted: papers should be shredded and other storage media should
be disposed in a secure manner.
9. System Controls
Controlled :Data should be processed on the basis of basic best practice.
Restricted/ Highly Restricted: approved system it is the the only way to processed Data,
which is mange by designated systems manager.
10. System Availability
Controlled :To ensure the availability of the data it should be should be subject to the
appropriate industry standards
Restricted : To ensure the availability of the data when it needed it should be should be
subject to the appropriate industry standards
Highly Restricted : Data should be hosted by a resilient infrastructure if the data
availability requirement is high.
Data Handling Guidelines

More Related Content

Similar to Paper rev

Deputy it operations manager chris down -interview presentation - final
Deputy it operations manager    chris down  -interview presentation - finalDeputy it operations manager    chris down  -interview presentation - final
Deputy it operations manager chris down -interview presentation - final
chrisdown68
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
gemaherd
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
MISY
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
Qualys
 

Similar to Paper rev (20)

Deputy it operations manager chris down -interview presentation - final
Deputy it operations manager    chris down  -interview presentation - finalDeputy it operations manager    chris down  -interview presentation - final
Deputy it operations manager chris down -interview presentation - final
 
Quality of information
Quality of informationQuality of information
Quality of information
 
L2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptxL2 - Protecting Security of Assets_.pptx
L2 - Protecting Security of Assets_.pptx
 
RCR 4 Data Management Introduction System Information
RCR 4 Data Management Introduction System InformationRCR 4 Data Management Introduction System Information
RCR 4 Data Management Introduction System Information
 
Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at data
 
Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5Umphrey hutcherson-ecu-cause2010-rev5
Umphrey hutcherson-ecu-cause2010-rev5
 
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
NIH Data Policy or: How I Learned to Stop Worrying and Love the Data Manageme...
 
rest motion.pptx
rest motion.pptxrest motion.pptx
rest motion.pptx
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Sample of The Varonis Data Risk Assessment
Sample of The Varonis Data Risk Assessment Sample of The Varonis Data Risk Assessment
Sample of The Varonis Data Risk Assessment
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Tech Matrix 20080523
Tech Matrix 20080523Tech Matrix 20080523
Tech Matrix 20080523
 
Data destruction policy
Data destruction policyData destruction policy
Data destruction policy
 
DATA MANAGEMENT – WHAT DOES IT MEAN FOR RESEARCHERS?
DATA MANAGEMENT – WHAT DOES IT MEAN FOR RESEARCHERS?DATA MANAGEMENT – WHAT DOES IT MEAN FOR RESEARCHERS?
DATA MANAGEMENT – WHAT DOES IT MEAN FOR RESEARCHERS?
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
Discovery of rest at data
Discovery of rest at dataDiscovery of rest at data
Discovery of rest at data
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 

Recently uploaded

obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontangobat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
siskavia95
 
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
varanasisatyanvesh
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
pwgnohujw
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
Amil baba
 
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
Obat Aborsi 088980685493 Jual Obat Aborsi
 
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
siskavia95
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
yhavx
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
yulianti213969
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Stephen266013
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
pwgnohujw
 

Recently uploaded (20)

obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontangobat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di  Bontang
obat aborsi Bontang wa 082135199655 jual obat aborsi cytotec asli di Bontang
 
Formulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdfFormulas dax para power bI de microsoft.pdf
Formulas dax para power bI de microsoft.pdf
 
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital AgeCredit Card Fraud Detection: Safeguarding Transactions in the Digital Age
Credit Card Fraud Detection: Safeguarding Transactions in the Digital Age
 
Predictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting TechniquesPredictive Precipitation: Advanced Rain Forecasting Techniques
Predictive Precipitation: Advanced Rain Forecasting Techniques
 
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
Identify Customer Segments to Create Customer Offers for Each Segment - Appli...
 
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
 
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
Statistics Informed Decisions Using Data 5th edition by Michael Sullivan solu...
 
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
原件一样(UWO毕业证书)西安大略大学毕业证成绩单留信学历认证
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
 
Fuel Efficiency Forecast: Predictive Analytics for a Greener Automotive Future
Fuel Efficiency Forecast: Predictive Analytics for a Greener Automotive FutureFuel Efficiency Forecast: Predictive Analytics for a Greener Automotive Future
Fuel Efficiency Forecast: Predictive Analytics for a Greener Automotive Future
 
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
Jual Obat Aborsi Lhokseumawe ( Asli No.1 ) 088980685493 Obat Penggugur Kandun...
 
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di  Ban...
obat aborsi Banjarmasin wa 082135199655 jual obat aborsi cytotec asli di Ban...
 
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotecAbortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
Abortion pills in Riyadh Saudi Arabia (+966572737505 buy cytotec
 
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarjSCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
SCI8-Q4-MOD11.pdfwrwujrrjfaajerjrajrrarj
 
Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024Northern New England Tableau User Group (TUG) May 2024
Northern New England Tableau User Group (TUG) May 2024
 
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
一比一原版(Monash毕业证书)莫纳什大学毕业证原件一模一样
 
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
obat aborsi Tarakan wa 081336238223 jual obat aborsi cytotec asli di Tarakan9...
 
What is Insertion Sort. Its basic information
What is Insertion Sort. Its basic informationWhat is Insertion Sort. Its basic information
What is Insertion Sort. Its basic information
 
Audience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptxAudience Researchndfhcvnfgvgbhujhgfv.pptx
Audience Researchndfhcvnfgvgbhujhgfv.pptx
 
原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证原件一样伦敦国王学院毕业证成绩单留信学历认证
原件一样伦敦国王学院毕业证成绩单留信学历认证
 

Paper rev

  • 1. Paper Review: Data Handling Guidelines Dublin City University Amnah Alowies Arwa Alamer Information Security - Fall 2019 Summarized by:
  • 2. Those guidelines provide the bases to people who are in charge of protecting the data as it give them a way to handle and classify these data. Data Classification: Controlled : The protection of the information is at the hand of the custodian and there is a low risk of embarrassment or repetitional harm. Restricted : Revelation, disclosure, loss of availability or integrity could hurt the reputation, or may have a short negative impact on the financial aspect. Highly Restricted : Disclosure could cause an exceptional or a long term damage to the reputation, it could also put those whose information is disclosed at risk, or may have serious impact or a long term negative financial circuses. Data Handling Guidelines
  • 3. these classification/activity include: 1. Access Control 2. Backup 3. Labelling 4. Physical Transfer (paper) 5. Electronic Storage 6. Electronic Transfer – Internal 7. Electronic Transfer – External 8. Disposal 9. System Controls 10.System Availability Data Handling Guidelines
  • 4. 1.Access Control Controlled : Available to all users who need these information. Restricted : Available to authorized users only. Access should be monitored and reviewed on a regular basis. When the access is given to a third party, a non-disclosure agreement should be taken. Highly Restricted : Available only to those who have an absolute requirement and authorization for access. This requirement should be submitted in a writing form and authorized by the data custodian. 2. Backup Controlled : Information should be protected and secured and have a backup. Restricted : Information should be protected by backups and put in a secure location far away from the source data. Highly Restricted : Information should be highly secured. Backups should be taken and checked a nightly basis. Backups should be in a secure fire-proof- place removed from the data source. 3.Labelling Controlled/Restricted/Highly Restricted : the labels should be used to convey the importance of the data, e.g. Confidential or Strictly Confidential. 4.Physical Transfer (paper) Controlled/Restricted/Highly Restricted : Data should be transfer with care when it in a physical form. Data Handling Guidelines
  • 5. 5. Electronic Storage Controlled : Must be stored in a system that is accessible to those authorized under the access control above. Restricted : Must be stored in a system that is accessible to those authorized under the access control above. Where information is held outside the source must be encrypted. Highly Restricted : Must be stored in a system that is accessible to those authorized under the access control above. Servers that hold the information must be held in a secure environment. 6. Electronic Transfer – Internal Controlled : Data should be encrypted when it necessary. Restricted : if data is transform over wireless the data must be encrypted. Highly Restricted : Data transfers have to be encrypted. Usb can not be use to transfer sensitive personal data. 7. Electronic Transfer – External Controlled : Data should be encrypted when it necessary. Restricted : Data should be encrypted if it was emailed. Highly Restricted :Data transfers have to be encrypted. USB can not be use to transfer sensitive personal data. Data should be encrypted if it was emailed. Data Handling Guidelines
  • 6. 8. Disposal Controlled : Normal fashion disposal. Restricted /Highly Restricted: papers should be shredded and other storage media should be disposed in a secure manner. 9. System Controls Controlled :Data should be processed on the basis of basic best practice. Restricted/ Highly Restricted: approved system it is the the only way to processed Data, which is mange by designated systems manager. 10. System Availability Controlled :To ensure the availability of the data it should be should be subject to the appropriate industry standards Restricted : To ensure the availability of the data when it needed it should be should be subject to the appropriate industry standards Highly Restricted : Data should be hosted by a resilient infrastructure if the data availability requirement is high. Data Handling Guidelines