data management?

What is the correct terminology for the overall management of sensitive data?

I am trying to research best practices in this area – but I am not exactly sure what the exact standard term will be so it’s hard to track down. Let me give you an example which may inspire you to the correct terminology.

We have say 5 highly sensitive databases MS-SQL, they have been secured in line with MS security best practice guidance. As has the host operating system (windows 2003 server).

But, then you find admin’s have taken clones or extracts of the database and housed them on other servers. Or during backup testing they have saved a backup of all the data in the database on another less secure server. These kind of issues are common place.

There must be some sort of title on how to best govern and protect against this kind of activity?

Can you name the exact principle/standard for this?
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Looks to me that you are talking about data governance.

I think you will find this link useful:

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
pma111Author Commented:
Ah yes I assume its fits under:

Transfer: Data used to run reports, transferred to third parties for processing, or exported for long-term backup or retention, need the same privacy and integrity as the original dataset.

that particular part yest, but you have to look at the whole process from the begining. So first you need to do data classification, defines data sensitivity and defines who should access what. Then apply the adequate mechanisms to secure then during entire data lifespan, including when sitting in a backup tape.

you might also want to take a look at the Data Governance Institute website:
Hi, let me know if you have more questions. If not, please remember to close this question by accepting any of the comments as the answer. :)
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.