Guidelines Establishing Requirements for Security and Confidentiality of Information Systems
The Board, 1974 - Computer security - 74 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Additional Administrative agencies appropriate areas aspect Assistant assure audit authorized Automation Board on Electronic California City collected Committee Communications complete computer system Conclusion confidentiality contained contingency plan continuous controls Corporation corrected cost County data security Department determine Director documentation effect Electronic Data Processing emergency employee ensure ENVIRONMENT equipment errors established evaluation facilities Factors files Fire functioning Guidelines hardware identification Impact individual information systems Input installation Intergovernmental Board internal July limit lines locations loss maintain Management measures Member method necessary operating organization personal data personnel physical security possible potential prevent PRIVACY AND SECURITY problem procedures protection records References remote terminals replacement reports responsibility restoration restrictions Review risk Sacramento safeguards Santa sensitive storage stored terminals tests tion trained unauthorized
Page 14 - ... press, or any member of the public, evidence of unfair information practice; (4) Take reasonable precautions to protect data in the system from any anticipated threats or hazards to the security of the system; (5) Make no transfer of individually identifiable personal data to another system without (i) specifying requirements for security of the data, including limitations on access thereto, and (ii) determining that the conditions of the transfer provide substantial assurance that those requirements...