Security Policy: Difference between revisions

Jump to navigation Jump to search
Line 227: Line 227:


:1. it is available and suitable for use, where and when it is needed; and
:1. it is available and suitable for use, where and when it is needed; and
:2. it is adequately protected (e.g. from loss of confidentiality, improper use, or loss of integrity).
:2. it is adequately protected (e.g. from loss of confidentiality, improper use, or loss of integrity).


Line 233: Line 232:


:3. distribution, access, retrieval and use;
:3. distribution, access, retrieval and use;
:4. storage and preservation, including the preservation of legibility;
:4. storage and preservation, including the preservation of legibility;
:5. control of changes (e.g. version control); and
:5. control of changes (e.g. version control); and
:6. retention and disposition.
:6. retention and disposition.