compliances

Secure Data Sharing

April 28, 2010
  1. What is it
  2. Where is it
  3. What is the Risk
     

Strategic

What Policy should be enforced

How can the process be Audited

Ongoing Process of Sharing Data

Tactical

Manage Removable Media

Encrypt mobile data

Provide users with relevant Policy excerpts and Audit acceptance