Section 30 Policies and Procedures Flashcards
(43 cards)
Defines the role of security in an organization and establishes the desired end state of the security program.
Policies
Provide a general direction and goals, a framework to meet the business goals, and define the roles, responsibilities, and terms.
Organizational Policies
Address the security needs of a specific technology, application, network, or computer system.
System Specific Policies
Category based on the value to the organization and the sensitivity of the information if it were to be disclosed.
Data Classification
Any information that can result in a loss of security, or loss of advantage to a company, if accessed by unauthorized persons.
Sensitive Data
Has no impacts to the company if released and is often posted in the open source environment.
Public Data
Contains data that should only be used within the organization.
Private Data
Highest classification level that contains items that contain trade secrets, intellectual prperty data, source code, and other types that would seriously affect that business if disclosed.
Confidential Data
Items that wouldn’t hurt national security if released but could impact those whose data is contained in it.
Sensitive But Unclassified
The process of identifying the person responsible for the confidentiality, integrity, availability,
Data Ownership
A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of the information assets.
Data Owner
A role focused on the quality of the data and associated metadata.
Data Steward
A role responsible for handling the management of the system on which the data assets are stored.
Data Custodian
A role responsible for the oversight of any PII/SPI/PHI assets managed by the company.
Privacy Officer
A piece of data that can be used either by itself or in combination with some other pieces of data to identify a single person.
Personal Identifiable Information (PII)
Affects US government computer systems that collects, stores, uses, or disseminates personally identifiable information.
Privacy Act of 1974
Affects healthcare providers, facilities, insurance companies, and medical data clearing houses.
Health Insurance Portability and Accountability Act (HIPPA)
Affects publicly traded US corporations and requires certain accounting methods and financial reporting requirements.
Sarbanes Oxley (SOX)
Affects banks, mortgage companies, loan offices, insurance companies, investment companies, and credit card providers.
Gramm Leach Bliley Act (GLBA)
Requires each agency to develop, document, and implement an agency wide information system security program to protect their data.
Federal Information Security Management Act (FISMA) 2002
Provides regulations that govern the security, confidentiality, and integrity of the personal information collected, stored, or processed during the election and voting process.
Help America Vote Act (HAVA) of 2002
A data governance requirement that arises when collecting and processing personal data to ensure the rights of the subject’s data.
Privacy
Personal data cannot be collected, processed, or retained without the individual’s informed consent.
General Data Protection Regulation (GDPR)
Methods and technologies that remove identifying information from data before it is distributed.
Deidentification