Restricting Access

Access to systems and their data must be restricted to ensure that information is denied to unauthorised users.

However, inappropriate restrictions could result in individual users being unable to do their job, and cause delays and errors in legitimate data processing. Similarly, excessive privilege could allow an authorised user to damage information systems and files, causing delays and errors.

To view the related Policy click      

 

  • Excessive systems privileges could allow authorised users to modify (or, more likely, corrupt / destroy) the operating system and business software settings with grave results.

There are 2 Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

  • Lack of access restrictions could :-
  1. Allow staff and third parties to modify documents and other data files.
  2. Risk loss of confidentiality and integrity, and also possible legal action for potential infringements of the Data Protection Act. See also Complying with Legal and Policy Requirements.

 

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

 

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page