-
Secure Data Disposal
-
Types
-
Formatting (Clearing)
- The removal of sensitive data from storage devices in such a way that there is assurance that the data may not be reconstructed using normal system functions or software file/data recovery utilities.
- The data may still be recoverable, but not without special laboratory techniques.
- When physical hardware will be re-used within an organization, it is formatted (cleared). This removes data on the device, but does not account for digital remanence.
-
Sanitizing (Purging)
- The removal of sensitive data from a system or storage device with the intent that the data cannot be reconstructed by any known technique.
-
Destruction
- The storage media is made unusable for conventional equipment.
-
Methods
-
Overwriting
- Saving over the data with new data
- Also called Wiping or Shredding
-
Degaussing
- Removing the magnetic field of a storage medium, making it impossible to be used for data storage
- Encryption
-
Destruction
-
Physical
- Breaking
-
Chemical
- Incineration
- Exposure to Caustic or Corrosive Chemicals
-
Phase Transition
- Melting
- Vaporizing
- Raising the Temperature
-
Exposure to EMI
- Microwaves
- Electric Current
-
Data Sensitivity Labeling and Handling
-
Public
- Information available to anyone. Also referred to as unclassified or nonclassified.
-
Internal, Private, or Proprietary
- Information used internally by a company
-
Types
-
Confidential
- Information that can cause financial and operational loss to the company.
-
Secret
- Data that should never become public and is critical to the company.
-
Top Secret
- The highest sensitivity of data; few people should have access, and security clearance may be necessary. Information is broken into sections on a need-to-know basis.
-
Personally Identifiable Information (PII) and Personal Health Information (PHI) Laws and Regulations
-
Privacy Act of 1974
- Establishes a code of fair information practice.
- Governs the collection, use, and dissemination of personally identifiable information about persons’ records maintained by federal agencies.
-
Sarbanes-Oxley (SOX)
- Governs the disclosure of financial and accounting information. Enacted in 2002.
-
Health Insurance Portability and Accountability Act (HIPAA)
- Governs the disclosure and protection of health information. Enacted in 1996.
-
Gramm-Leach-Bliley Act (GLBA)
- Enables commercial banks, investment banks, securities firms, and insurance companies to consolidate. Enacted in 1999.
- Protects against pretexting. Individuals need proper authority to gain access to nonpublic information such as Social Security numbers.
-
Help America Vote Act of 2002 (HAVA)
- Main goal was to replace punchcard and lever-based voting systems.
- Governs the security, confidentiality, and integrity of personal information collected, stored, or otherwise used by various electronic and computer-based voting systems.
-
California SB 1386
- Requires California businesses that store computerized personal information to immediately disclose breaches of security. Enacted in 2003.
-
Data Roles
-
Key Concepts
- The definition of roles is needed to maintain clear responsibility and accountability.
- Protecting the security of information and assets is everyone’s responsibility.
-
Roles
-
Executives and Senior Management (C Suite)
- Have ultimate responsibility over the security of data and assets.
- Involved in and approve access control policies.
-
Data Owner
- Maintains ownership of and responsibility over a specific piece or subset of data.
-
Responsibilities:
- Determine the appropriate classification of the information
- Ensure that the information is protected with controls
- Periodically review classification and access rights
- Understand risks associated with the information
-
Data Custodian
- Performs day-to-day tasks on behalf of the data owner.
-
Responsibilities:
- Ensure that the information is available to the end user
- Ensure that security policies, standards, and guidelines are followed
-
System Owner
- Ensures that the data is secure while it is being processed by the system they own.
-
Responsibilities:
- Security of the systems that handle and process information owned by different data owners
-
Security Administrator
- Manages the process for granting access rights to information.
-
Responsibilities:
- Assigning privileges
- Granting access
- Monitoring and maintaining access logs
-
End User
- The final users of information.
-
Responsibilities:
- Adhering to the organization’s security policy
-
Auditor
-
Responsibilities:
- Determining whether owners, custodians, and systems are compliant with the organization’s security policies
- Providing independent assurance to senior management
-
Data Retention
- The continued storage of an organization's data for compliance or business reasons.
- Data retention policies weigh legal and privacy concerns against economics and need-to-know concerns to determine the retention time, archival rules, data formats, and the permissible means of storage, access, and encryption.