The original article: https://legascom.ru/notes/7442-organizational-methods-of-protection-against-unauthorized-access .
Effective information protection is possible if a number of conditions are met:
unity in solving industrial, commercial, financial and security issues;
coordination of security measures between all interested departments of the enterprise;
scientific assessment of information and objects subject to classification (protection); development of regime measures before the start of regime work;
personal responsibility (including financial responsibility) of managers at all levels, performers involved in closed works, for ensuring the safety of secrecy and maintaining the security regime of the work carried out at the proper level;
the inclusion of the main duties of workers, specialists and administration to comply with specific requirements of the regime in the collective agreement, contract, employment agreement, labor regulations;
the organization of special office work, the order of storage, transportation of secret carriers; the introduction of appropriate labeling of documents and other carriers of classified information;
formation of a list of persons authorized by the head of the enterprise to classify information and objects containing confidential information;
optimal limitation of the number of persons allowed to access the protected information;
availability of a single access procedure and registration of passes;
compliance with the requirements to ensure the preservation of protected information in the design and placement of special premises, in the process of experimental design, testing and production of products, sales, advertising, signing contracts, during particularly important meetings, during the use of technical means of processing, storing and transmitting information, etc.;
organization of interaction with government authorities who have the authority to control certain types of activities of enterprises and firms;
availability of security, access and in-site modes;
planning of the development and implementation of information protection measures, systematic monitoring of the effectiveness of the measures taken;
creation of a system for training performers in the rules for ensuring the safety of information.
The original article: https://legascom.ru/notes/7442-organizational-methods-of-protection-against-unauthorized-access .
Присоединяйтесь — мы покажем вам много интересного
Присоединяйтесь к ОК, чтобы подписаться на группу и комментировать публикации.
Нет комментариев