Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Protective Marking Schemes

Posted on 2010-11-24
1
Medium Priority
?
561 Views
Last Modified: 2012-05-10
Can anyone tell me how a “protective marking scheme” actually works in your organisations?

And also what families of data does it apply to, i.e. just data that has been printed onto a paper copy, or does it also apply to electronic data like email, database records etc.

Out of interest if it applies to electronic email and database records especially, how do you “protectively mark” a database record?

Is it just the PROTECT, CONFIDENTIAL type marking on a document, and then a set of business rules communicated to all employees who handle such information to handle it in a specific way based on the protective label it has been given?

Is it typical some businesses have some types of not so sensitive data that doesn’t have to be protectively marked, and other types of more sensitive data that do need to be protectively marked? Or is it typical the whole business should have some sort of marking scheme for every type of data they process store?

And also how do you configure every IT application you use to print every document with the necessary PROTECT, CONFIDENTIAL type marking, it just doesn’t seem practical to me?

Any pointers most welcome…
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 46

Accepted Solution

by:
tbsgadi earned 2000 total points
ID: 34225073
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What we learned in Webroot's webinar on multi-vector protection.
An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question