Also, inventory the information you have by type and location. Inventory all computers, laptops, mobile devices, flash drives, disks, home computers, digital copiers, and other equipment to find out where your company stores sensitive data.Know what personal information you have in your files and on your computers. Create a plan to respond to security incidents.ġ. Properly dispose of what you no longer need. Keep only what you need for your business. Regardless of the size-or nature-of your business, the principles in this brochure will go a long way toward helping you keep data secure.Ī sound data security plan is built on 5 key principles: Others may find it helpful to hire a contractor. Some businesses may have the expertise in-house to implement an appropriate plan. Given the cost of a security breach-losing your customers’ trust and perhaps even defending yourself against a lawsuit-safeguarding personal information is just plain good business. However, if sensitive data falls into the wrong hands, it can lead to fraud, identity theft, or similar harms. This information often is necessary to fill orders, meet payroll, or perform other necessary business functions. Most companies keep sensitive personal information in their files-names, Social Security numbers, credit card, or other account data-that identifies customers or employees. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |