Content
- Should define who can have access to sensitive information.
- Should define how sensitive information is to be stored and transmitted (encrypted, archive files, unencoded, etc.).
- Should define on which systems sensitive information can be stored.
- Should discuss what levels of sensitive information can be printed on physically insecure printers.
- Should define how sensitive information is removed from systems and storage devices.
- Should discuss any default file and directory permissions defined in system-wide configuration files.
Read more about this topic: Information Protection Policy
Famous quotes containing the word content:
“Know how to be content and you will never be disgraced; practice self-restraint and you will never be in danger.”
—Chinese proverb.
Laozi.
“Here form is content, content is form.”
—Samuel Beckett (19061989)
“It seems that I must bid the Muse to pack,
Choose Plato and Plotinus for a friend
Until imagination, ear and eye,
Can be content with argument and deal
In abstract things; or be derided by
A sort of battered kettle at the heel.”
—William Butler Yeats (18651939)