Information Asset Classification, Handling, and Protection Guidelines

information asset classification handling n.w
1 / 7
Embed
Share

Explore the classification, handling, and protection of information assets, including roles and access levels based on risk categorization. Learn about server policies and infrastructure support.

  • Information Security
  • Data Protection
  • Access Control
  • Risk Management
  • Server Policies

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Information Asset Classification, Handling, and Protection

  2. Index Types of Information Medium Risk Data High Risk data Roles in admin area

  3. From candidates Medium risk Just Customer Success that have the role to attend candidates in WallJobs can have access to this part of the system.

  4. From Interns Just C-Levels and customer success (focal point with company) can have access

  5. From Companies High Risk Just C-Levels and customer success (focal point with company) can have access

  6. Roles of WallJobs Employers Roles in Admin Marketing - can access just marketing data in admin -Medium and low risk Customer Success - can access your customers data in admin -medium risk Financial -can access financial data in admin - high risk C-Level (partner)-can access all data in admin - high risk IT team -can access data that make sense in their tasks, with the authorization of the CTO. -high risk

  7. Serves policy How our servers handle the information and the protection. WallJobs uses Herokuapp to support our infrastructure. Our platform is hostege on herokuapp that uses postgrees that have all compliances processess documented at https://devcenter.heroku.com/articles/security-privacy-compliance

Related


More Related Content