?
Solved

Protective Marking Schemes

Posted on 2010-11-24
1
Medium Priority
?
557 Views
Last Modified: 2012-05-10
Can anyone tell me how a “protective marking scheme” actually works in your organisations?

And also what families of data does it apply to, i.e. just data that has been printed onto a paper copy, or does it also apply to electronic data like email, database records etc.

Out of interest if it applies to electronic email and database records especially, how do you “protectively mark” a database record?

Is it just the PROTECT, CONFIDENTIAL type marking on a document, and then a set of business rules communicated to all employees who handle such information to handle it in a specific way based on the protective label it has been given?

Is it typical some businesses have some types of not so sensitive data that doesn’t have to be protectively marked, and other types of more sensitive data that do need to be protectively marked? Or is it typical the whole business should have some sort of marking scheme for every type of data they process store?

And also how do you configure every IT application you use to print every document with the necessary PROTECT, CONFIDENTIAL type marking, it just doesn’t seem practical to me?

Any pointers most welcome…
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 46

Accepted Solution

by:
tbsgadi earned 2000 total points
ID: 34225073
0

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
In today's business world, data is more important than ever for informing marketing campaigns. Accessing and using data, however, may not come naturally to some creative marketing professionals. Here are four tips for adapting to wield data for insi…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question