Information Technology Reference
In-Depth Information
6.2 Protected Information (PI) Transmission
6.2.1  PI in Transit
6.2.2  Real-Time Processing
6.2.3  Batch Processing
6.3
Back Office
6.3.1 
PI at Rest (Storage)
6.3.2 
Local
6.3.2.1 Backup
6.3.2.2 Archive
6.3.3  Attribute-Based Access Controls (ABACs)
6.3.4  PI Sharing (Inter- and Intraorganizational)
6.3.5 
PI Destruction and Discard
6.3.5.1
Destruction
6.3.5.2
Discard
7
pMp implementation
7.1
Protected Information Management Policy and Practice
7.2
Privacy Rights Management
7.3
Stakeholder Trust Management
7.4
Privacy Services
7.5
Privacy Mechanisms
7.6
Privacy Vendors and Products
7.7
Operations and Maintenance
7.8
Best Practices
Search WWH ::




Custom Search