/
IM and Security

IM and Security

The security issue dealing with IM, is a key element in IM process. Information is not always given the protection it deserves based on its value. The following best practices are to consider:

  • Identify roles and responsibilities in regard to the access, protection, and distribution of information.

  • Categorize information - don't treat all information the same. categorize information to manage it according to its value.

  • Store information and data according to its value.

  • Protect data according to its value

  • Replicate critical information and data throughout the day to ensure no data loss incurs

  • Backup important data and information to an alternative location

  • Test data recovery and business continuity/disaster recovery regularly (daily) to ensure it can overcome any potential data loss as soon as possible.

  • Ensure types of users are identified and enforced, such as administrator, read and write access, read only access or no access

Related content

Version0.1-Guidance on IM document architecture
Version0.1-Guidance on IM document architecture
More like this
IM and Technology
IM and Technology
More like this
PART VI. INFORMATION MANAGEMENT
PART VI. INFORMATION MANAGEMENT
More like this
ET-IM-7 (2021-Jun-29) Meeting notes
ET-IM-7 (2021-Jun-29) Meeting notes
More like this
ET-IM-16 (2022-Apr-28) Meeting notes
ET-IM-16 (2022-Apr-28) Meeting notes
More like this
ET-IM-11(2021-Oct-28) Meeting notes
ET-IM-11(2021-Oct-28) Meeting notes
More like this