Resources

Guide

Three Steps to Protecting PII in the Government

This guide discusses the three key steps that must be taken by government organizations to protect PII they have in their possession.Identify your PII through marking and metadata taggingEducate and build awareness of the organization’s PII among employees, contractors, and partnersSelect the appropriate controls to protect PII...
Guide

Protecting Sensitive ITAR Information: A Data-Centric Approach To Export Control Compliance

ITAR covers the transfer of technical data and information relating to goods, as well as the goods themselves. Technical documents, product plans and specifications, design drawings, manuals and financial details may all need to be shared across the supply chain if an ITAR-related project is to be delivered. However, authority needs to be granted and access by unauthorized persons prohibited or...
Guide

The Protective Security Policy Framework (PSPF) – Protecting Government Classified Information

Big data, data governance, data management and securing sensitive data – these are everyday challenges for Australian Government organizations, as well as making sure that sensitive data has the right security labelling applied.In this whitepaper we will explore how the Australian Protective Security Policy Framework is helping government agencies. We will examine Protective Markings, what these...
Guide

Meeting the UK Government Security Classifications (GSC) Requirements

With email the de-facto method of sharing information, government organizations must balance the need to share with the need to protect data from leakage or loss.In an effort to address a problem which is never far from the headlines, the UK Government has revised the requirements in its Government Security Classification (GSC) scheme to ensure information security, privacy and accountability.Our...
Guide

Government Classification and Protective Marking Systems

Big data, data governance, data management and securing sensitive data – these are everyday challenges for government organizations around the world, as well as making sure that sensitive data has the right security labelling applied.In this whitepaper we will explore how classification and protective marking schemes are helping government organizations better secure data. We will delve into...