Guidelines Establishing Requirements for Security and Confidentiality of Information Systems

Front Cover

What people are saying - Write a review

We haven't found any reviews in the usual places.

Common terms and phrases

Popular passages

Page 14 - ... press, or any member of the public, evidence of unfair information practice; (4) Take reasonable precautions to protect data in the system from any anticipated threats or hazards to the security of the system; (5) Make no transfer of individually identifiable personal data to another system without (i) specifying requirements for security of the data, including limitations on access thereto, and (ii) determining that the conditions of the transfer provide substantial assurance that those requirements...
Page 31 - These hardware countermeasures do not, however, provide protection of a user file in auxiliary storage from unauthorized access. To this end, software schemes have augmented the hardware methods.
Page 12 - The relevance of specific items of information should also be established, or the items should be deleted from the file.
Page 25 - Computer Security — The corporate Achilles Heel" BUSINESS AUTOMATION, February 1, 1971, pp. 32-38.

Bibliographic information