O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Data Security Considerations

Everything we do with computers and networks allows the flow and usage of data. Every company, organization, and government agency is focused on the collection and use of data, regardless of their function. Even manufacturers have critical data-handling aspects of their operations that include pricing, shop floor automation, and inventory controls. The handling of the data is so important that in defining the policy needs and collecting inventories, understanding the use and structure of the data (as well as where it is stored) should be a requirement of all involved with writing security policies.

Handling of Data

How will data be handled? There are many aspects of dealing with data that must be considered when ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required