Information Owner
Information Owner: The information owner is typically a member of senior management with designated responsibility over specific sets of information within an organization. They are accountable for setting the policies for classifying, handling, and safeguarding the information, as well as ensuring that the information is used in compliance with legal and policy requirements.
Information Rights Management (IRM)
Information Rights Management (IRM): A technology used to control access to and usage of digital information. It is used in the legal and financial industries to prevent unauthorized access and ensure compliance with data protection regulations. Examples include password-protecting documents, setting expiration dates for access, and limiting the ability to print or copy sensitive information.
Inadvertent disclosure
Inadvertent disclosure: The accidental release of sensitive information. It is used in data security and privacy regulations to prevent unauthorized access to confidential data. Examples include a careless employee sending an email with personal information to the wrong recipient or a data breach caused by a weak password.
Help desk
Help desk: A service provided by an organization to assist users with technical or other issues. It is used to provide support to users who are experiencing problems with their computer systems or software. Examples include providing assistance with password resets, troubleshooting network connectivity issues, and providing guidance on how to use specific software applications.
Handling of Assets
Handling of Assets: The processes and practices associated with managing and protecting an organization’s valuable resources, or ‘assets.’ These assets can include data, hardware, software, and intellectual property. From a security perspective, proper asset handling is vital to prevent unauthorized access, misuse, alteration, or destruction. It typically involves tasks such as asset identification, classification based […]
Hard copy key
Hard copy key: A physical key or token used to gain access to a location or system. Examples include metal keys, keycards, and smart keys, often kept on a keychain or similar device for use in unlocking doors, starting vehicles, or entering secure areas.