IT Governance, Risk, and Compliance

May 17 2013   1:49AM GMT

Revisiting the Safeguarding of Information Assets – Part XVI

Robert Davis Robert Davis Profile: Robert Davis

Security laws can decree the required degree of protection for property, usually based on governmental interest. Specifically, information security laws may outline control measures to prevent unauthorized access to devices that process sensitive data. Inclusively, directed data control measures can encompass peripheral equipment considered important for compliant protection. Consequently, IT resources should be integrated with an approach that repels potential compromises in applicable data treatment edicts for the defined subject matter.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: