P. 1
Data Security For the Business Owner

Data Security For the Business Owner

|Views: 95|Likes:
Published by Eric Vought
This a partial draft of a manual on data security for a non-computer nerd small to mid-sized business owner. it explains security concepts, contains a glossary, an annotated bibliography, and identifies ways to manage the risk represented by information technology. I worked on this a couple of years ago and gave up at least temporarily because the technology and threats were changing faster than I could write. I have put up the partial draft because it might be useful to some people and I occasionally refer folks to sections I wrote when they ask related questions. If the draft does appear to be useful and there is sufficient interest, I may continue working on it.
This a partial draft of a manual on data security for a non-computer nerd small to mid-sized business owner. it explains security concepts, contains a glossary, an annotated bibliography, and identifies ways to manage the risk represented by information technology. I worked on this a couple of years ago and gave up at least temporarily because the technology and threats were changing faster than I could write. I have put up the partial draft because it might be useful to some people and I occasionally refer folks to sections I wrote when they ask related questions. If the draft does appear to be useful and there is sufficient interest, I may continue working on it.

More info:

Published by: Eric Vought on Jun 24, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/11/2014

pdf

text

original

Parts of your business are more sensitive than others. You would not ask the same people to negotiate
with clients or give you legal advice that you hire to answer the phones. This is both a question of trust
and of competence. Your legal counsel is trained and licensed to practice law. You probably went through
some screening or interview process to select a lawyer that you were comfortable with, even if that was
only flipping through the yellow pages and talking to some of them on the phone. As you develop your
business relationship, you may trust them to perform tasks with less intervention.

Only certain employees have access to your financial information, including your bank balance, the ability
to write checks, business credit accounts and so forth. These employees have a background, such as a

Business Data Security

5

CPA license or business course, which makes them appropriate choices for their assigned tasks. If you
are prudent, you check on their work regularly, going over accounts and reports, checking invoices and
balances and, generally making sure that you are not being taken advantage of. When employees leave, you
must ensure that important records and items stay behind and that they no longer have access to accounts
they worked with during their employment.

Tip

You should be aware of who has access to your electronic information, what their disclosure
policies are, and how it might affect your business.

If you deal with sensitive information, you may have to perform background checks on applicants. This
may include drug screening, records checks, and checking references. Employees who have gone through
ths screening will have access to parts of your business that others do not.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->