| Home | Free Articles for Your Site | Submit an Article | Advertise | Link to Us | Search | Contact Us |
This site is an archive of old articles

    SEARCH ARTICLES


vertical line

Article Surfing Archive


Hacker Steals Secret Government Plans - Protect Your Information, Or Pay The Price - Articles Surfing

There are two main types of information where access needs to be managed;

1) Company Information
2) Private Individual Information

Companies limit access to certain information on their computer network as a matter of routine. Not everyone will be able to access last month's sales figures or know the detailed plans for next year. Everyone accepts this as reasonable and protection against speculation in the company's shares.

Management of sensitive information of this type is can be achieved by firewalls and password protection within a company's computer network. Access to the information can also be at various levels, eg read only or editing rights.

Backing up data on a daily basis is an essential part of a company's disaster recovery plan. Very sensitive information may not be stored on a network connected computer. Hackers are a security threat that most IT network managers are very aware of.

Every company and government body also gathers information on us. That might be as simple as a database of phone numbers and addresses, or it could include your Social Security number and driving licence details. There are laws in place to limit how that information is accessed and used.

Government agencies and large companies usually comply fully with all state and federal legislation regarding Information management. They have personnel who are exclusively responsible for managing the information databases.

Small businesses may be less vigilant in their compliance, not through a lack of willingness, but through a lack of knowledge or management time. When there is effectively one person making all planning and management decisions in a company, a policy for information management is not always high on the agenda.

You have the right to see the information that any company or organization holds on you and to have it corrected if inaccuracies exist. You should also ask what the company uses the information for, whether it is for marketing purposes or whether the information is shared with other companies

Submitted by:

Pearl Deloria

Ciara McGrath is a full time mother to four teenage daughters. Find more articles here. Find more info at Info Management or Document Archiving.


        RELATED SITES



https://articlesurfing.org/business/hacker_steals_secret_government_plans_protect_your_information_or_pay_the_price.html

Copyright © 1995 - 2024 Photius Coutsoukis (All Rights Reserved).

ARTICLE CATEGORIES

Aging
Arts and Crafts
Auto and Trucks
Automotive
Business
Business and Finance
Cancer Survival
Career
Classifieds
Computers and Internet
Computers and Technology
Cooking
Culture
Education
Education #2
Entertainment
Etiquette
Family
Finances
Food and Drink
Food and Drink B
Gadgets and Gizmos
Gardening
Health
Hobbies
Home Improvement
Home Management
Humor
Internet
Jobs
Kids and Teens
Learning Languages
Leadership
Legal
Legal B
Marketing
Marketing B
Medical Business
Medicines and Remedies
Music and Movies
Online Business
Opinions
Parenting
Parenting B
Pets
Pets and Animals
Poetry
Politics
Politics and Government
Real Estate
Recreation
Recreation and Sports
Science
Self Help
Self Improvement
Short Stories
Site Promotion
Society
Sports
Travel and Leisure
Travel Part B
Web Development
Wellness, Fitness and Diet
World Affairs
Writing
Writing B