SlideShare a Scribd company logo
+




          Managing The Confidentiality
    Electronic Data and Records Management


              www.greenleafinstitute.com
+                                                               2

    Objectives of this Module
    With this module, it is expected that the reader will:


       Understand the general concept of confidentiality and
        intangible asset
       Appreciate the risks of data leak to individuals and
        organizations
       Acknowledge the need of information classification
        through contractual elements and self-management
       Learn how to conduct the information classification
+                                                                                3

    Outline
       Confidentiality: what matters for your organization
           Intangible assets & liability
           Organizational reputation
           Overwhelming data


       Confidentiality infringement & risks
           Cases study
           Risk management


       Information classification
           Objectives & guidelines
           Who to play role?
           Information handling: creation, update, transmission, publication,
            deletion
           Classification scheme & data handling matrix
+                                                                    4

    What Constitutes Confidential
    Information?
       Economic value of its existence?
          Intangible asset
          Competitive advantage
          Strategic value


       Associated risk when leaking it?
          Business disruption
          Diminishing competitiveness
          Degrading reputation



       Something you don’t want to see on the headlines of media?
+                                                                                              5


    Overwhelming
    Information &
    Data Records
                                                            Patent
                                                                          Credit
  Main concern: to ensure that                   Product                  History
                                                 Pricing   Trademarks
  electronic documentation &                                                        Customer
  records shall only be accessible      Copyright                                     Data
                                                            Marketing Plans
  to those who are authorized,
                                                                          Human Capital
  and be restricted from the rest.
                                     Health Insurance Record
                                                                     Trade Secrets
  Nevertheless, there is                        Business Plans
  necessity to balance it against                                     Operating Plans
                                        Costs
  the enterprise need to use and                     Salary Data        Management
  share the information…                                                 Changes
                                            Vendor Information            Profits
                                                           Shareholders
                                                              Data
Confidentiliaty & EDRM
+                                                       6

    What causes infringement to
    confidentiality?
       Accident & negligence

       Natural causes

       Malicious attack: internal & external factors

       Awareness problems
+                                                                        7

    Case 1 – US: When disposal is not
    disposal
       Secure disposal of computer media is by now a fairly well
        known requirement. It is widely, although not universally
        practiced. An uncontrolled disposal, however, can prove
        fatal. Stories of competitors, or their agents, retrieving old
        diskettes/CDs/listings/etc from garbage bins are rife.

       A network was uncovered which specialized in the recovery
        and sale of corporate data. One of their methods was to
        purchase old tapes and diskettes from large companies and
        then restore the data using their own recovery software.
        This was then discretely offered for sale to selected
        competitors!


       The hardware fault was not always terminal for the data
        stored.
+                                                                        8

    Case 2 – India: Outsourcing breach
       British undercover reporter revealed that they managed to
        obtain a bulk of confidential details of thousand British bank
        accounts that includes information of addresses, passwords,
        phone numbers, passport and driving licences details.


       This confidential data was purchased for £3 per customer.
        Financial institutions such as Barclays, Lloyds TSB, the
        Nationwide and HSBC were affected.


       The Sun’s Delhi-based contact boasted that he could sell
        details of up to 200,000 accounts each month, said the
        newspaper.
+                                                                               9

    Case 3 – US: Banking critical data
    loss
       Three HSBC firms have been fined more than £3 million by the
        Financial Services Authority (FSA) for failing to secure customer
        data.

       The FSA claimed the three firms sent large amounts of unencrypted
        data – often on discs sent via the post – and staff were untrained on
        the issue of identity theft.

       The FSA said that, in April 2007, HSBC Acutaries lost a floppy disk
        in the post that contained 1,917 pension numbers and addresses.
        And, in February 2008, HSBC Life lost an unencrypted disk holding
        data on 180,000 policy holders – also in the post.
+                                                              10

    Risk Management
     Contractual     risk management

        Contracting: employment, outsourcing, S&P, SLA, JV…
        Non-disclosure agreement (NDA)


     EDRM     confidentiality policy

        Greater information security policy
        Information classification matrix & guidelines
        Information labeling and handling measures
+                                                                              11

    Contractual Risk Management

       Ensuring confidentiality shall be clearly provided in various
        contractual establishments by imposing and enforcing non-
        disclosure agreement (NDA):


           Employment contract  employees liability


           SLA  reminding vendors & outsourcing service providers of their
            confidentiality liability
+                                                                                12

    Information Classification
       Objective: To ensure that information assets receive an appropriate
        level of protection according to level of sensitivity and criticality

       Information should be classified to indicate the needs, priorities and
        degree of protection

       Information classification system should be used to define an
        appropriate set of protection levels and needs for special handling
        measures

       The classification is a shorthand way of determining how information
        is to be handled and protected
+                                                                     13


    Why Classify Information



        10%                     80%                       10%
       Public         Internal Use Information         Confidential
    Information                                        Information




                  100% of all enterprise information
14


Information Classification Lifecycle

                  5. ENFORCE THE             1. CREATE/REVIEW
                IMPLEMENTATION OF                POLICY ON
                INFORMATION MATRIX          INFO CLASSIFICATION




            4. CREATE INFO
                                                       2. CLASSIFY INFO
       CLASSIFICATION MATRIX
                                                  BASED ON BUSINESS NEEDS,
         INCLUDING LABELING
                                                    IMPACT AND PRIORITIES
        &HANDLING MEASURES




                               3. IDENTIFY INFO
                                 ORIGINATOR,
                                  DEVELOPER,
                               OWNER AND USER
+                                      15

    Who to Play Role?




    Creator/Developer   Owner   User
+                                                                   16

    Who to Play Role?

       Responsibility of the originator or nominated owner of
        information:

           Defining the classification of an item of information
           Periodically reviewing that classification
           Info labeling and handling measures
+                                                                                         17

    Information Labeling & Handling
       Output from system containing sensitive or critical information should carry an
        appropriate classification label. This applies for info output both in physical
        and electronic forms.



       For each classification, handling procedures should be defined to cover the
        following types of information processing activity:


           Copying

           Storage

           Transmission by post, fax, email, etc

           Transmission by spoken word, including mobile phone, voicemail,
            answering machine

           Destruction
+                                                                                      18

    FOUR Classification Rules
    1.   MYOB – MIND YOUR ORGANIZATION’S BUSINESS. Take into
         account of business needs for sharing or restricting information and the
         business impact associated with such needs. Outputs of classified data
         should be labeled in terms of its value and sensitivity to the organization

    2.   FLEXIBILITY. Accept the fact that the classification is not fixed for all
         time, thus it may change according to a predetermined policy

    3.   SIMPLICITY. Consider appropriate and practical numbers of
         classification categories. Overly complex scheme may become
         cumbersome, uneconomic and impractical. Avoid over-classification.

    4.   FAMILIARITY. Make the policy and guidelines known to everybody
         involved in the whole information lifecycle – and that includes outsiders.
19



Information Classification

                                                    Top
                                                   Secret
It is advisable to restrict the number of
information classification levels in your         Highly
organization to a manageable number as          Confidential

having too many makes maintenance and
compliance difficult.                            Proprietary


The following five levels of classification
cover most eventualities:                     Internal Use Only




                                              Public Documents
+                                                                           20

    Information Classification (cont’d)

    Top Secret:


       Highly sensitive internal documents, e.g. impending mergers or
        acquisitions, investment strategies, plans or designs that could
        seriously damage the organization if lost or made public.


       Information classified as Top Secret has very restricted
        distribution and must be protected at all times. Security at this
        level is the highest possible.
+                                                                                 21

    Information Classification (cont’d)
    Highly Confidential:



       Information which is considered critical to the organization’s ongoing
        operations and could seriously impede them if made public or shared
        internally. Such information includes accounting information, business
        plans, sensitive information of customers of banks (etc), patients'
        medical records, and similar highly sensitive data.



       Such information should not be copied or removed from the
        organization’s operational control without specific authority. Security
        should be very high.
+                                                                          22

    Information Classification (cont’d)
    Proprietary:


       Procedures, operational work routines, project plans, designs
        and specifications that define the way in which the organization
        operates.


       Such information is normally for proprietary use by authorized
        personnel only. Security at this level is high.
+                                                                            23

    Information Classification (cont’d)
    Internal Use Only:


       Information not approved for general circulation outside the
        organization where its disclosure would inconvenience the
        organization or management, but is unlikely to result in financial
        loss or serious damage to credibility.


       Examples include: internal memos, minutes of meetings,
        internal project reports. Security at this level is controlled but
        normal.
+                                                                  24

    Information Classification (cont’d)
    Public Documents:


       Information in the public domain: annual reports, press
        statements etc. which have been approved for public use.



       Security at this level is minimal.
+                                                               25

    Designing info classification matrix

    A.   Classification definitions & examples

    B.   Types of information (structured & unstructured)

    C.   Information protection roles (who to do what)

    D.   Definition of risk zones & their protection measures

    E.   Handling & labeling procedure
+                                                                    26

    Checklist

       General information security policy ______
       Information classification matrix       ______
       Info handling & labeling procedure ______
       Confidentiality/NDA provision within
           Employment contract                    ________
           Outsourcing contract                   ________
           Joint ventures agreement                      ________
           Service level agreement                       ________
           Standard operating procedures                 ________
           E-mail signatures                             ________
           Presentations materials, e-records, etc       ________
+




    THANK YOU.
           Copyright:




     www.greenleafinstitute.com

More Related Content

PDF
Under Lock And Key
PDF
Solutions for privacy, disclosure and encryption
PDF
Self-Protecting Information for De-Perimiterised Electronic Relationships
PDF
Managed Security For A Not So Secure World Wp090991
PDF
Data Breaches Preparedness (Credit Union Conference Session)
PPTX
Cloud Privacy Update: What You Need to Know
PDF
Strong Authentication: Securing Identities and Enabling Business
PDF
Cloud Privacy
Under Lock And Key
Solutions for privacy, disclosure and encryption
Self-Protecting Information for De-Perimiterised Electronic Relationships
Managed Security For A Not So Secure World Wp090991
Data Breaches Preparedness (Credit Union Conference Session)
Cloud Privacy Update: What You Need to Know
Strong Authentication: Securing Identities and Enabling Business
Cloud Privacy

What's hot (20)

PDF
IBM Banking: Automated Systems help meet new Compliance Requirements
PPTX
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
PDF
Data Breach Response Guide (Whitepaper))
PDF
Ssi Data Protection Solutions V0.2
PDF
The Need for DLP now - A Clearswift White Paper
PDF
Information Governance for Smarter Government Strategy and Solutions
PPSX
PDF
Sept 2012 data security & cyber liability
PPT
Ecommerce Chap 10
PPTX
“The Fountain of Truth” Web-based Contract Management for Starwood Hotels –
PDF
Information Governance-a programmatic perspective on driving value through RI...
PDF
Security Built Upon a Foundation of Trust
PDF
Contractor Exposed Manufacturer's Sensitive Data
PDF
Breached! The First 48
PDF
Configuration File of Trojan Targets Organization
PDF
Tape vaulting audit and encryption usage analysis
PDF
1 s2.0-s0167404801002097-main
PDF
Solix EDMS Data Masking
PPTX
Dynamic access control sbc12 - thuan nguyen
DOCX
Securing Business-Information from Microsoft -Presented by Atidan
IBM Banking: Automated Systems help meet new Compliance Requirements
Taxonomy Management, Automatic Metadata Tagging & Auto Classification in Shar...
Data Breach Response Guide (Whitepaper))
Ssi Data Protection Solutions V0.2
The Need for DLP now - A Clearswift White Paper
Information Governance for Smarter Government Strategy and Solutions
Sept 2012 data security & cyber liability
Ecommerce Chap 10
“The Fountain of Truth” Web-based Contract Management for Starwood Hotels –
Information Governance-a programmatic perspective on driving value through RI...
Security Built Upon a Foundation of Trust
Contractor Exposed Manufacturer's Sensitive Data
Breached! The First 48
Configuration File of Trojan Targets Organization
Tape vaulting audit and encryption usage analysis
1 s2.0-s0167404801002097-main
Solix EDMS Data Masking
Dynamic access control sbc12 - thuan nguyen
Securing Business-Information from Microsoft -Presented by Atidan
Ad

Similar to Electronic data & record management (20)

PPTX
Information awareness program
PDF
Strategic Information Management Through Data Classification
PDF
Prepare For Breaches Like a Pro
PDF
How to Secure Your Files with DLP and FAM
PPT
FTC Protecting Info A Guide For Business Powerpoint
PDF
Protecting Personal Information: A Guide for Business
PPTX
Data Management - NA CACS 2009
PPTX
Information governance process & technology
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
PPT
Responsible for information
PPTX
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
PPTX
CISSP - Chapter 2 - Asset Security
PDF
The Effective eDocument Retention Program - Policies, Processes and Solutions
PPTX
Best Practice For Public Sector Information Security And Compliance
PDF
Why Have A Digital Investigative Infrastructure
PDF
Business Identity Theft Kit
PDF
Information for Businesses - ca
PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PPTX
Cybertopicsecurity_3
PPT
Powerpoint mack jackson
Information awareness program
Strategic Information Management Through Data Classification
Prepare For Breaches Like a Pro
How to Secure Your Files with DLP and FAM
FTC Protecting Info A Guide For Business Powerpoint
Protecting Personal Information: A Guide for Business
Data Management - NA CACS 2009
Information governance process & technology
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Responsible for information
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
CISSP - Chapter 2 - Asset Security
The Effective eDocument Retention Program - Policies, Processes and Solutions
Best Practice For Public Sector Information Security And Compliance
Why Have A Digital Investigative Infrastructure
Business Identity Theft Kit
Information for Businesses - ca
Protecting the Crown Jewels – Enlist the Beefeaters
Cybertopicsecurity_3
Powerpoint mack jackson
Ad

Recently uploaded (20)

PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PPTX
Business Ethics - An introduction and its overview.pptx
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
A Brief Introduction About Julia Allison
PPTX
Probability Distribution, binomial distribution, poisson distribution
PPT
Chapter four Project-Preparation material
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PPTX
Amazon (Business Studies) management studies
PDF
Business model innovation report 2022.pdf
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
MSPs in 10 Words - Created by US MSP Network
Chapter 5_Foreign Exchange Market in .pdf
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Business Ethics - An introduction and its overview.pptx
unit 1 COST ACCOUNTING AND COST SHEET
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
340036916-American-Literature-Literary-Period-Overview.ppt
ICG2025_ICG 6th steering committee 30-8-24.pptx
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Laughter Yoga Basic Learning Workshop Manual
A Brief Introduction About Julia Allison
Probability Distribution, binomial distribution, poisson distribution
Chapter four Project-Preparation material
Belch_12e_PPT_Ch18_Accessible_university.pptx
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Amazon (Business Studies) management studies
Business model innovation report 2022.pdf
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Power and position in leadershipDOC-20250808-WA0011..pdf
Reconciliation AND MEMORANDUM RECONCILATION
MSPs in 10 Words - Created by US MSP Network

Electronic data & record management

  • 1. + Managing The Confidentiality Electronic Data and Records Management www.greenleafinstitute.com
  • 2. + 2 Objectives of this Module With this module, it is expected that the reader will:  Understand the general concept of confidentiality and intangible asset  Appreciate the risks of data leak to individuals and organizations  Acknowledge the need of information classification through contractual elements and self-management  Learn how to conduct the information classification
  • 3. + 3 Outline  Confidentiality: what matters for your organization  Intangible assets & liability  Organizational reputation  Overwhelming data  Confidentiality infringement & risks  Cases study  Risk management  Information classification  Objectives & guidelines  Who to play role?  Information handling: creation, update, transmission, publication, deletion  Classification scheme & data handling matrix
  • 4. + 4 What Constitutes Confidential Information?  Economic value of its existence? Intangible asset Competitive advantage Strategic value  Associated risk when leaking it? Business disruption Diminishing competitiveness Degrading reputation  Something you don’t want to see on the headlines of media?
  • 5. + 5 Overwhelming Information & Data Records Patent Credit Main concern: to ensure that Product History Pricing Trademarks electronic documentation & Customer records shall only be accessible Copyright Data Marketing Plans to those who are authorized, Human Capital and be restricted from the rest. Health Insurance Record Trade Secrets Nevertheless, there is Business Plans necessity to balance it against Operating Plans Costs the enterprise need to use and Salary Data Management share the information… Changes Vendor Information Profits Shareholders Data Confidentiliaty & EDRM
  • 6. + 6 What causes infringement to confidentiality?  Accident & negligence  Natural causes  Malicious attack: internal & external factors  Awareness problems
  • 7. + 7 Case 1 – US: When disposal is not disposal  Secure disposal of computer media is by now a fairly well known requirement. It is widely, although not universally practiced. An uncontrolled disposal, however, can prove fatal. Stories of competitors, or their agents, retrieving old diskettes/CDs/listings/etc from garbage bins are rife.  A network was uncovered which specialized in the recovery and sale of corporate data. One of their methods was to purchase old tapes and diskettes from large companies and then restore the data using their own recovery software. This was then discretely offered for sale to selected competitors!  The hardware fault was not always terminal for the data stored.
  • 8. + 8 Case 2 – India: Outsourcing breach  British undercover reporter revealed that they managed to obtain a bulk of confidential details of thousand British bank accounts that includes information of addresses, passwords, phone numbers, passport and driving licences details.  This confidential data was purchased for £3 per customer. Financial institutions such as Barclays, Lloyds TSB, the Nationwide and HSBC were affected.  The Sun’s Delhi-based contact boasted that he could sell details of up to 200,000 accounts each month, said the newspaper.
  • 9. + 9 Case 3 – US: Banking critical data loss  Three HSBC firms have been fined more than £3 million by the Financial Services Authority (FSA) for failing to secure customer data.  The FSA claimed the three firms sent large amounts of unencrypted data – often on discs sent via the post – and staff were untrained on the issue of identity theft.  The FSA said that, in April 2007, HSBC Acutaries lost a floppy disk in the post that contained 1,917 pension numbers and addresses. And, in February 2008, HSBC Life lost an unencrypted disk holding data on 180,000 policy holders – also in the post.
  • 10. + 10 Risk Management  Contractual risk management  Contracting: employment, outsourcing, S&P, SLA, JV…  Non-disclosure agreement (NDA)  EDRM confidentiality policy  Greater information security policy  Information classification matrix & guidelines  Information labeling and handling measures
  • 11. + 11 Contractual Risk Management  Ensuring confidentiality shall be clearly provided in various contractual establishments by imposing and enforcing non- disclosure agreement (NDA):  Employment contract  employees liability  SLA  reminding vendors & outsourcing service providers of their confidentiality liability
  • 12. + 12 Information Classification  Objective: To ensure that information assets receive an appropriate level of protection according to level of sensitivity and criticality  Information should be classified to indicate the needs, priorities and degree of protection  Information classification system should be used to define an appropriate set of protection levels and needs for special handling measures  The classification is a shorthand way of determining how information is to be handled and protected
  • 13. + 13 Why Classify Information 10% 80% 10% Public Internal Use Information Confidential Information Information 100% of all enterprise information
  • 14. 14 Information Classification Lifecycle 5. ENFORCE THE 1. CREATE/REVIEW IMPLEMENTATION OF POLICY ON INFORMATION MATRIX INFO CLASSIFICATION 4. CREATE INFO 2. CLASSIFY INFO CLASSIFICATION MATRIX BASED ON BUSINESS NEEDS, INCLUDING LABELING IMPACT AND PRIORITIES &HANDLING MEASURES 3. IDENTIFY INFO ORIGINATOR, DEVELOPER, OWNER AND USER
  • 15. + 15 Who to Play Role? Creator/Developer Owner User
  • 16. + 16 Who to Play Role?  Responsibility of the originator or nominated owner of information:  Defining the classification of an item of information  Periodically reviewing that classification  Info labeling and handling measures
  • 17. + 17 Information Labeling & Handling  Output from system containing sensitive or critical information should carry an appropriate classification label. This applies for info output both in physical and electronic forms.  For each classification, handling procedures should be defined to cover the following types of information processing activity:  Copying  Storage  Transmission by post, fax, email, etc  Transmission by spoken word, including mobile phone, voicemail, answering machine  Destruction
  • 18. + 18 FOUR Classification Rules 1. MYOB – MIND YOUR ORGANIZATION’S BUSINESS. Take into account of business needs for sharing or restricting information and the business impact associated with such needs. Outputs of classified data should be labeled in terms of its value and sensitivity to the organization 2. FLEXIBILITY. Accept the fact that the classification is not fixed for all time, thus it may change according to a predetermined policy 3. SIMPLICITY. Consider appropriate and practical numbers of classification categories. Overly complex scheme may become cumbersome, uneconomic and impractical. Avoid over-classification. 4. FAMILIARITY. Make the policy and guidelines known to everybody involved in the whole information lifecycle – and that includes outsiders.
  • 19. 19 Information Classification Top Secret It is advisable to restrict the number of information classification levels in your Highly organization to a manageable number as Confidential having too many makes maintenance and compliance difficult. Proprietary The following five levels of classification cover most eventualities: Internal Use Only Public Documents
  • 20. + 20 Information Classification (cont’d) Top Secret:  Highly sensitive internal documents, e.g. impending mergers or acquisitions, investment strategies, plans or designs that could seriously damage the organization if lost or made public.  Information classified as Top Secret has very restricted distribution and must be protected at all times. Security at this level is the highest possible.
  • 21. + 21 Information Classification (cont’d) Highly Confidential:  Information which is considered critical to the organization’s ongoing operations and could seriously impede them if made public or shared internally. Such information includes accounting information, business plans, sensitive information of customers of banks (etc), patients' medical records, and similar highly sensitive data.  Such information should not be copied or removed from the organization’s operational control without specific authority. Security should be very high.
  • 22. + 22 Information Classification (cont’d) Proprietary:  Procedures, operational work routines, project plans, designs and specifications that define the way in which the organization operates.  Such information is normally for proprietary use by authorized personnel only. Security at this level is high.
  • 23. + 23 Information Classification (cont’d) Internal Use Only:  Information not approved for general circulation outside the organization where its disclosure would inconvenience the organization or management, but is unlikely to result in financial loss or serious damage to credibility.  Examples include: internal memos, minutes of meetings, internal project reports. Security at this level is controlled but normal.
  • 24. + 24 Information Classification (cont’d) Public Documents:  Information in the public domain: annual reports, press statements etc. which have been approved for public use.  Security at this level is minimal.
  • 25. + 25 Designing info classification matrix A. Classification definitions & examples B. Types of information (structured & unstructured) C. Information protection roles (who to do what) D. Definition of risk zones & their protection measures E. Handling & labeling procedure
  • 26. + 26 Checklist  General information security policy ______  Information classification matrix ______  Info handling & labeling procedure ______  Confidentiality/NDA provision within  Employment contract ________  Outsourcing contract ________  Joint ventures agreement ________  Service level agreement ________  Standard operating procedures ________  E-mail signatures ________  Presentations materials, e-records, etc ________
  • 27. + THANK YOU. Copyright: www.greenleafinstitute.com