Solved

Protective Marking Schemes

Posted on 2010-11-24
1
543 Views
Last Modified: 2012-05-10
Can anyone tell me how a “protective marking scheme” actually works in your organisations?

And also what families of data does it apply to, i.e. just data that has been printed onto a paper copy, or does it also apply to electronic data like email, database records etc.

Out of interest if it applies to electronic email and database records especially, how do you “protectively mark” a database record?

Is it just the PROTECT, CONFIDENTIAL type marking on a document, and then a set of business rules communicated to all employees who handle such information to handle it in a specific way based on the protective label it has been given?

Is it typical some businesses have some types of not so sensitive data that doesn’t have to be protectively marked, and other types of more sensitive data that do need to be protectively marked? Or is it typical the whole business should have some sort of marking scheme for every type of data they process store?

And also how do you configure every IT application you use to print every document with the necessary PROTECT, CONFIDENTIAL type marking, it just doesn’t seem practical to me?

Any pointers most welcome…
0
Comment
Question by:pma111
1 Comment
 
LVL 46

Accepted Solution

by:
tbsgadi earned 500 total points
ID: 34225073
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question