Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

OVERVIEW OF INFORMATION MANAGEMENT

INFORMATION MANAGEMENT

Is generally defined as the harnessing of the information resources and information


capabilities of the organization so that the organization can make use of the information
to improve its efficiency and effectiveness. It is also viewed as management of
organizational processes and systems that acquire, create, organize, distribute and use
information. Therefore, information management brings together two basic concepts:
information and management. Information is broadly defined in this guidance and
includes all manner of data in its many forms. Therefore, its management takes into
account the whole information life-cycle including the capturing, storing, managing,
preserving and delivering regardless of source or format (data, paper documents,
electronic documents, audio, video, and so on). Information management is the way a
company organizes information about the operation of its business.

DATA SECURITY TOOLS

Data security refers to the process of protecting data from unauthorized access
and data corruption throughout its lifecycle. Data security includes data encryption,
tokenization, and key management practices that protect data across all applications and
platforms.

 WHY DATA SECURITY


Organization around the globe are investing heavily in information
technology (IT) cyber defense capabilities to protect their critical assets. Whether
an enterprise needs to protect a brand, intellectual capital, and costumer
information or provide controls for critical infrastructure, the means for incident
detection and response to protecting organizational interests have three common
elements: people, processes, and technology.

 DATA SECURITY SOLUTIONS


Micro Focus drives leadership in data security solutions with over 80 patents
and 51 years of expertise. With advanced data encryption, tokenization, and key
management to protect data across application, transactions, storage. And big
data platforms

 LIST OF MICRO FOCUS DATA SECURITY SOLUTION/TOOLS


 Cloud Access Security
 Data Encryption
 Email Security
 Cloud Email Security
 Enterprise Data Protection
 Payments Security
 Big Data, Hadoop, and loT Data Protection
 Mobile App Security
 Web Browser Security

DATA PRIVACY POLICY

IMPLEMENTING RULES AND REGULATIONS OF REPUBLICACT. NO


10173, known as the “DATA PRIVACY ACT OF 2012”

RULE I. PRELIMINARY PROVOIONS


RULE II. SCOPE OF APPLICATION
RULES III. NATIONAL PRICAVY COMMISION
RULE IV. DATA PRIVACY PRIMCIPLES
RULE V. LAWFUL PROCESSING OF PERSONAL DATA
RULE VI. SECURITY MEASURES FOR THE PROTECTION OF PERSONAL
DATA
RULE VII. SECURITY OF SENSITIVE PERSONAL INFORMATION IN
GOVERNMENT
RULE VIII. RIGHTS OF DATA SUBJECTS
RULE IX. DATA BREACH NOTIFICATION
RULEX: OUTSOURCING AND SUBCONTRACTING AGREEMENTS
RULES XI. REGISTRATION AND COMPLIANCE REQUIREMENTS

You might also like