The University of Hertfordshire holds an extensive variety of data that must be endangered against unofficial access, exposure, alteration, or other misappropriation. Efficient management of such properties is also essential to obey permissible and supervisory obligations such as applicable Data Protection regulation and to safeguard efficient treatment of Autonomy of Information requirements. Different types of data require dissimilar protection actions and consequently, applying cataloguing patterns of information properties is energetic to confirming operative information safety and management. Information cataloguing is applied to safeguard that data assets accept a suitable level of defence. The appropriate classification, management, and storing of data is the accountability of every University of Hertfordshire staff member. This policy is obligatory and spread on to all University of Hertfordshire staff, students, servicers, sub-contractors, intervention workers, and third gatherings that consume access to University of Hertfordshire information.
This is a plan that outlines the way to generate, collect as well as store data. The application of a data management plan safeguards the process of sharing and preserving information in a long-term agreement. Organizations are more interested in adopting data management plans with the aim to advance the information regulatory compliance is and its reviews for continuous improvements in data management.
This is one of the approaches that is applied in the field of information security management to identify and address privacy risks in compliance with GDPR requirements.
An information administrator stands for an individual who is responsible for maintaining and protecting the information generated and collected by the organization.
In the field of information security management, the CIA stands for information confidentiality, information integrity as well as information availability. Information confidentiality stands for an aspect that ensures the security of collected data to protect the sensitive information of users from unauthorized access. Information integrity stands for the management of data originality that restricts unauthorized professionals to manipulate the stored data. Information availability refers to an aspect that offers 24/7 availability of the data stored to ensure the data can be used whenever it is required (Yin et al., 2020).
This element stands for the core aspects of information that is structured and managed as a single entity and value for the information generated by the university.
An information asset owner stands for an individual that has the responsibility for managing the data liability and data protection against any threat and negligence. This is to mention that the information asset owner is the head of a specific department present in the data security management operation that takes care of information asset protection and security of the organizational data.
This is one of the important aspects that need to be considered while performing information classification and handling in university as the classification arrangement identifies data that is applied by the university. And in this policy, the information is classified or restricted considering their usability and disability.
Topic |
Public |
Internal |
Confidential |
Backup & Recovery |
The backup and recovery files will not be available for the public and only the general information about the university will be accessible by the public. |
The Backup & Recovery will be kept as internal factor by ensuring their security and integrity. |
The confidential data present in the Backup & Recovery file will be managed and protected by the Information Administrator and Information Asset Owner. |
Student Record |
The Student Record files will not be available for the public and only the general information about the university students will be accessible by the public. |
The Student Record will be kept as internal factor by ensuring their security and integrity. |
The confidential data present in the Student Record file will be managed and protected by the Information Administrator and Information Asset Owner. |
University Computer Server |
The university computer server will be protected from public access. |
The university computer server will be protected by considering it as an internal document to ensure effective handling of information and its security. |
The data present in the University Computer Server will be handled by Information Asset Owner. |
University Network |
The university network server will be protected from public access. |
The university computer network server will be protected by considering it as an internal document to ensure effective handling of information and its network security. |
The data present in the University network Server will be handled by Information Asset Owner. |
The university payment data |
The university payment data will be protected from the unauthorised access. |
The university payment data will be protected from the unauthorised access considering it as information asset. |
The university payment data will be protected from the unauthorised access by protecting the user confidentiality. |
Following policies will be applied in the University of Hertfordshire: –
The Information Classification and Handling Policy will be reviewed, evaluated and updated yearly or additional frequently if required with the aim to ensure that any changes to the University of Hertfordshire structure and organizational practices are appropriately replicated in the policy. In addition to this it is also need to mentioned that the Information Classification and Handling Policy will be reviewed, evaluated and updated to identify the existing gap and response to it quickly. The Information Governance and Security Steering Group and Information Asset Owners and Information Administrators with perform the evaluation. The findings will be reported to the executive head of the University of Hertfordshire.
In the following table the risks associated with the information handling and management are listed. The risk register will also contain of the demonstration of likelihood, consequences, risk rating as well as responsible practitioner.
ID |
Risk |
Consequences |
Likelihood |
Score |
Mitigation |
Responsible Professional |
1. |
Data Breach |
Loss is confidentiality |
Certain |
Implementation of firewall. |
IT expert |
|
2. |
Poor alignment with the security policy. |
Loss of reputation |
Rare |
Major |
Better need analysis and its alignment. |
IT expert |
3. |
Lack of expertise to support the information handling |
Information handling inefficiency |
Certain |
Medium |
Hire skilled expertise. |
Information Governance and Security Steering Group |
4. |
Inappropriate data classification |
Information handling inefficiency |
Rare |
Major |
Application of recommended data classification policy and instruction. |
Information Asset Owners and Information Administrators |
In the following table the risk register, risk rating and its associated definition are mentioned: –
Likelihood |
Consequence |
||||
Insignificant |
Minor |
Moderate |
Major |
Severe |
|
Almost Certain |
Medium |
High |
Extreme |
Extreme |
Extreme |
Likely |
Medium |
Medium |
High |
Extreme |
Extreme |
Possible |
Low |
Medium |
Medium |
High |
Extreme |
Unlikely |
Low |
Low |
Medium |
Medium |
High |
Rare |
Low |
Low |
Low |
Medium |
Medium |
Descriptor |
Level |
Definition |
Insignificant |
1 |
No mutilation |
Minor |
2 |
Impairment requiring first aid |
Moderate |
3 |
Impairment needs higher attention |
Major |
4 |
Impairment needs immediate attention |
Severe |
5 |
Loss |
Descriptor |
Level |
Definition |
Rare |
1 |
May occur uncommonly. |
Unlikely |
2 |
May occur uncommonly or more that rate cases. |
Possible |
3 |
May occur numerous times. |
Likely |
4 |
May occur quite a lot of times. |
Almost Certain |
5 |
Prone to occur commonly. |
Descriptor |
Definition |
Extreme: |
Advise the department directly. Corrective activities would be taken proximately. |
High: |
Advise the project manager proximately. Counteractive movements would be occupied within 48 hours of announcement. |
Medium: |
Inform the project manager. Counteractive movements would be occupied within 7 days. |
Low |
Counteractive movements would be occupied in approximately times to treat the danger. |
Policy:
Following policies will be applied in the University of Hertfordshire: –
Reference:
Zaeem, R. N., & Barber, K. S. (2020). The effect of the GDPR on privacy policies: Recent progress and future promise. ACM Transactions on Management Information Systems (TMIS), 12(1), 1-20.
Chico, V. (2018). The impact of the general data protection regulation on health research. British medical bulletin, 128(1), 109-118.
Loideain, N. N., & Adams, R. (2020). From Alexa to Siri and the GDPR: the gendering of virtual personal assistants and the role of data protection impact assessments. Computer Law & Security Review, 36, 105366.
Yin, L., Fang, B., Guo, Y., Sun, Z., & Tian, Z. (2020). Hierarchically defining Internet of Things security: From CIA to CACA. International Journal of Distributed Sensor Networks, 16(1), 1550147719899374.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download