How to tackle information lifecycle management

How to tackle information lifecycle management


The threat model for information stored locally, within network perimeters, is different that of information shared in collaborative, deperimeterised environments. The former allows an organisation to control access to information within a secured perimeter for a specified set of users, while the latter allows information “into the wild” where there is no perimeter in which to enforce access control and no finite set of users to control access for.

It is therefore essential that information is correctly and accurately classified to identify the organisations and individuals that should have access to it as well as the data handling requirements such as secure storage and safe disposal that are relevant to the information content.

20 Oct 2011
09 Nov 2010
5 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor