Security Policy: Difference between revisions
		
		
		
		Jump to navigation
		Jump to search
		
| Line 227: | Line 227: | ||
| :1. it is available and suitable for use, where and when it is needed; and | :1. it is available and suitable for use, where and when it is needed; and | ||
| :2. it is adequately protected (e.g. from loss of confidentiality, improper use, or loss of integrity). | :2. it is adequately protected (e.g. from loss of confidentiality, improper use, or loss of integrity). | ||
|  |  | ||
| Line 233: | Line 232: | ||
| :3. distribution, access, retrieval and use; | :3. distribution, access, retrieval and use; | ||
| :4. storage and preservation, including the preservation of legibility; | :4. storage and preservation, including the preservation of legibility; | ||
| :5. control of changes (e.g. version control); and | :5. control of changes (e.g. version control); and | ||
| :6. retention and disposition. | :6. retention and disposition. | ||