Corporate Data, Record Management and Security

INTRODUCTION

 

In any organization, Data is considered a primary asset and as such must be managed and protected in a manner that is commensurate to its value.  Security of corporate data is also necessary in today’s environment because data processing represents a concentration of valuable assets in the form of information, equipment and personnel.  The dependence on automated information system for management decision and the driving of the core operations of many organizations by electronic devices create a unique vulnerability for such organizations. 

The data management policy must ensure that data is protected in all of its forms, on all media, during all phases of its life cycle, from unauthorized or inappropriate access, use, modification, disclosure or destruction, and are extended to customer data assets that exist.

Part of data management activities is how to manage risk associated with corporate data. The International Organization for standardization (ISO) and many other international organizations developed many principles on this topic.

 

OBJECTIVES

 

At the end of this course, the participants will be able to:

-          Identify data, types of data and importance of data

-          Identify risks associated with data

-          Organize data

-          Safeguard data and prevent attacks

-          Ensure that corporate  data are managed properly

 

COURSE CONTENTS

1.      Overview of Corporate Data

  Definition

-          Data Governance

-          Data Storage

-          Database Management and Transmission

 

 2. Data Security

-           Access

-          Erasure

-          Privacy

-          Security

-          Integrity

-          Disposal

 

3.    Corporate Data Classification

        -  Public company Data

        -   Proprietary company Data

        -    Confidential company data

        -   Confidential customer data

 

4.a Data Organization

         - Master

         -  Transaction

         -  Reference

         - Maintenance etc

         -   History

4b   Electronic Records/Data Organization

        -Electronic file naming

        - Short Meaningful names

        - Separating words

        -  Duplication

        - dating

        - Numbering

        - Common Words

        - Correspondence

 

5.     Automated Data Control

        -   Limit check

         -  Fragmented limit check

         -  Compatibility check

         -  Class check

         - Range check etc

 

6.      Guidelines for Data Security Policy

          - Statement of purpose

          - Scope

          - Policy statement

          - Responsibilities

          - Audience

          - Enforcement

          - Exception

          - Other consideration

          - Communicating policy

          - Review and update process

          - Implementation

          - Monitoring compliance    


7.       Physical Access Control to Data

           - Dead-man door

        -   Biometric door lock

        -   Cipher locks

        -   Cameras

        -   Guards etc

 

8.     Logical Access Control to Data

         -  Password

         -  Cryptographic etc

 9.    Disaster Recovery and Business Continuity

          - Data backup

          - Duplicate processing

          - Off site backup

          - History Data or Archiving

          - Insurance

 

10.     Possible Disasters to Data

           -            Viruses and Worms

           -            Trojans

           -            Logic Bomb etc.

11.     Functional Data Processing Features

-          Hardware

-          Software

-          Processing Standard

-          Data Entry

-          Record Linkage

-          Security; etc.

 

12.    Data Security Management in Distributed Computer System

-          In Distributed System

-          Client/Server System

-          Security’s General Problem etc

13.    Information and Advice

-    Data: a core asset

-    The Personal Implications

-    Medium of Data Transmission

-    Outside the physical parameter

And Laptops are easily lost

-                      Three states of data

-                      Handling data is different today

-                      Data loss Vs Data theft

-                      Costs

-                      Security to compliance

-                      Define a policy

-                      Effective technologies

-                      User education

-                      Who’s responsible

-                      Conclusion.

FOR WHOM:

·         Auditors

·         Internal Control Officers

·         IT Personnel

·         HR Staff


For further enquiries : Call  Ijeoma on 08035749609



Tuesday Sep 3, 2019 to Thursday Sep 5, 2019

NGN 80000 (Members)
NGN 85000 (Non-Members)

OWERRI
OWERRI, OWERRI

Register Now Send to a friend






Related Events

Back to top