backdrop

Sensitive Data Handling

For clarity on what ‘sensitive data is, refer to your Company’s Information Security policy. It should also stipulate guidelines, specific to your org, on how to handle sensitive data.

Generally, any data that helps identify individuals, their residency, banking, or health information is considered sensitive. Also, information that can risk the competitive advantages or reputation of the organization is sensitive.
slider

As an employee, here are 11 steps you can take to handle sensitive data well, to mitigate the risk of a breach:

  1. Ensure devices have encryption.
  2. Use synthetic data, instead of actual, where possible. This way, any leakage does not risk real people.
  3. When sharing information internally, and especially externally, only pass on what is needed. Remove non-relevant content.
  4. Secure/Wipe the hard drive before disposing of old devices.
  5. Restrict locations to which work files with sensitive information can be saved or copied.
  6. Use application-level encryption to protect the information in your files.
  7. Develop the habit of deleting unnecessary files, which no longer serve your business purpose. Note to check for storage rules in your Company’s information security policies first.
  8. Use Virtual Private Networks (VPNs) when logging in from outside the workplace.
  9. Limit sharing of data externally. If possible, consider using data leakage prevention tools.
  10. Stop using USB drives altogether, or limit the storage of sensitive information on unencrypted devices.
  11. Use separate wifi for Guests/Customers.

As you may notice in the steps above, developing a more proactive, defensive approach to data is most helpful, especially where sensitivities are high.

Sensitive Data Handling

More articles like this

Find out how we can assist you in completing your compliance journey.

    toaster icon

    Thank you for reaching out to us!

    We will get back to you soon.