11.07.2015 Views

Information Management Strategy.pdf - Lincolnshire Police

Information Management Strategy.pdf - Lincolnshire Police

Information Management Strategy.pdf - Lincolnshire Police

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NOT PROTECTIVELY MARKEDKey DefinitionsData <strong>Information</strong> which:(a)(b)(c)(d)Is being processed by means of equipment operating automaticallyin response to instructions given for that purpose,Is recorded with the intention that it should be processed by meansof such equipment,Is recorded as part of a relevant filing system or with the intentionthat it should form part of a relevant filing system,Does not fall within paragraph (a), (b) or (c) but forms part of anaccessible record as defined by section 68. (Data Protection Act1998), or is recorded information held by a public authority and doesnot fall within any of paragraphs (a) to (d) (this fifth category wascreated by the Freedom of <strong>Information</strong> Act 2000 with effect from 01January 2005).The component(s) of information such as numbers, words or pictureswithout context, which in themselves, without any context, mean little andsay even less. Data becomes information once it is put into a frameworkor structure that provides context.DocumentA structured unit of recorded information, published or unpublished, inhard copy or electronic form, and managed as a discrete unit. (ISO15489:2001) A document forms part of a business transaction and islinked to other documents relating to that transaction or process.<strong>Information</strong>Data that has context and meaning, and therefore understood by people.<strong>Information</strong> AssetA definable piece of information, stored in any manner, which isrecognised as „valuable‟ to the organisation, i.e. they are not easilyreplaceable without cost, skill, time, resources or a combination. Theinformation which comprises an <strong>Information</strong> Asset, may be little more thana prospect name and address file; or it may be the plans for the release ofthe latest in a range of products to compete with competitors.It is the purpose of information security to identify the threats against, therisks and the associated potential damage to, and the safeguarding ofNOT PROTECTIVELY MARKED 58

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!