IT Governance, Risk, and Compliance

May 17 2013   1:49AM GMT

Revisiting the Safeguarding of Information Assets – Part XVI



Posted by: Robert Davis
Tags:
Information Assets Protection
Information Security
Information Security Governance
Information Security Management
IT Controls
Security Frameworks

Security laws can decree the required degree of protection for property, usually based on governmental interest. Specifically, information security laws may outline control measures to prevent unauthorized access to devices that process sensitive data. Inclusively, directed data control measures can encompass peripheral equipment considered important for compliant protection. Consequently, IT resources should be integrated with an approach that repels potential compromises in applicable data treatment edicts for the defined subject matter.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: