Travel Reference
In-Depth Information
stealing). Basic security protocols must be established dealing with such
issues as:
Classification of documents and computer disks
Handling/storage/disposal procedures for each classification
Clean desk policy
Access limitation
Electronic surveillance countermeasures
Use of secure communication systems for conversations that are con-
sidered sensitive
Computer security and hacking
CLASSIFICATION
Classification is an issue common to anyone who has ever worked for the
government or the military. In fact, virtually everyone has an idea about
what it means, for example, to mark a document “Top Secret.” Basically,
the classification system is a method of determining the number and iden-
tity of persons authorized to read certain documents. The system also pro-
vides instruction as to how to use and handle a particular item classified
in a particular way. For example, an unclassified document has no secu-
rity limitation placed on it at all. Anyone may see it, read it, or use it in
any manner. There is no handling restriction placed on it. It may be dis-
carded as ordinary trash and does not need any protection at all. Each
step up the classification ladder requires the application of more stringent
rules regarding how the document must be stored, who can see it, and how
it must be destroyed. The first step to take is to establish a method to clas-
sify and mark all materials generated during the course of business. Man-
agement needs to determine exactly what criteria should be used to
determine classification level. Actually, this is quite easy to do. Informa-
tion that you don't want unauthorized individuals to see will get classified.
If only a few individuals need to know something, then you classify the
document with the higher “Need to Know” standard. Information that
might be ruinous to your business if a competitor obtained it can be clas-
sified as having the highest level of restriction. Classification must be
identified by marking the document, usually with color codes. An example
Search WWH ::




Custom Search