Solved

Protective Marking Schemes

Posted on 2010-11-24
1
548 Views
Last Modified: 2012-05-10
Can anyone tell me how a “protective marking scheme” actually works in your organisations?

And also what families of data does it apply to, i.e. just data that has been printed onto a paper copy, or does it also apply to electronic data like email, database records etc.

Out of interest if it applies to electronic email and database records especially, how do you “protectively mark” a database record?

Is it just the PROTECT, CONFIDENTIAL type marking on a document, and then a set of business rules communicated to all employees who handle such information to handle it in a specific way based on the protective label it has been given?

Is it typical some businesses have some types of not so sensitive data that doesn’t have to be protectively marked, and other types of more sensitive data that do need to be protectively marked? Or is it typical the whole business should have some sort of marking scheme for every type of data they process store?

And also how do you configure every IT application you use to print every document with the necessary PROTECT, CONFIDENTIAL type marking, it just doesn’t seem practical to me?

Any pointers most welcome…
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 46

Accepted Solution

by:
tbsgadi earned 500 total points
ID: 34225073
0

Featured Post

Are You Ransomware's Next Victim?

Worried about ransomware attacks hitting your organization?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with WatchGuard Total Security!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question