Data Management

All persons who have access to computer systems use data. This data needs to be protected, and this section covers the Information Security risks involved in using or managing data.

Transferring and Exchanging Data
Managing Data Storage
Managing Databases
Permitting Emergency Data Amendment
Receiving Information on Disks
Setting up a New Folder / Directory
Amending Directory Structures
Archiving Documents
Information Retention Policy
Setting up New Spreadsheets
Setting up New Databases
Linking Information between Documents and Files
Updating Draft Reports
Deleting Draft Reports
Using Version Control Systems
Sharing Data on Project Management Systems
Updating Customer Information
Using Meaningful File Names
Using Headers and Footers
Using and Deleting 'Temp' Files
Using Customer and Other Third Party Data Files
Saving Data / Information by Individual Users

Previous PageTop of this pageNext Page

Information Security Policies from US$595


Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word


Next PageUpPrevious Page