Data Management

All persons who have access to computer systems use data. This data needs to be protected, and this section covers the Information Security risks involved in using or managing data.

Transferring and Exchanging Data
Managing Data Storage
Managing Databases
Permitting Emergency Data Amendment
Receiving Information on Disks
Setting up a New Folder / Directory
Amending Directory Structures
Archiving Documents
Information Retention Policy
Setting up New Spreadsheets
Setting up New Databases
Linking Information between Documents and Files
Updating Draft Reports
Deleting Draft Reports
Using Version Control Systems
Sharing Data on Project Management Systems
Updating Customer Information
Using Meaningful File Names
Using Headers and Footers
Using and Deleting 'Temp' Files
Using Customer and Other Third Party Data Files
Saving Data / Information by Individual Users

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page