ACCT2000 Chapter Notes - Chapter 9: Information Rights Management, Digital Watermarking, Data Masking

29 views3 pages

Document Summary

Four activities must be undertaken to preserve the confidentiality of sensitive information: Identify and classify the information to be protected; This step involves identifying where information resides and who has access. The information must then be classified in terms of its value to the organisation. Encryption is the only way to protect information in transit over the internet. Some irm software even has the capability to limit access privileges to a specific period of time and to remotely erase protected files. Data loss prevention (dlp) is software which works like antivirus programs in reverse, blocking outgoing messages that contain key words or phrases associated with intellectual property or other sensitive data the organisation wants to protect. A digital watermark is code embedded in documents that enables an organisation to identify confidential information that has been disclosed. With proper training, employees can play an important role in protecting the confidentiality of an orga(cid:374)isatio(cid:374)"s i(cid:374)for(cid:373)atio(cid:374) a(cid:374)d e(cid:374)ha(cid:374)(cid:272)e the effe(cid:272)ti(cid:448)e(cid:374)ess of related (cid:272)o(cid:374)trols.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents

Related Questions