19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

Sample result 6: Modification times<br />

Software: Modification only on a change of version<br />

System data: Frequent modifications<br />

Application data:<br />

Files of written correspondence: Daily modifications<br />

Customer database: Daily modifications<br />

Protocol data: Continuous modifications<br />

Deadlines<br />

It should be clarified as to whether certain deadlines must be observed for the<br />

data. This can involve storage or deletion deadlines relating to person-related<br />

data. <strong>The</strong>se deadlines must be considered when laying down the data backup<br />

policy.<br />

Sample result 7: Deadlines<br />

Software: Storage not necessary<br />

System data: Storage not necessary<br />

Application data:<br />

Files of written correspondence: storage period for accounting<br />

documents is six years (§257 HGB), an annual data backup should<br />

be stored for this period<br />

Customer database: Storage not necessary; deletion deadlines are to<br />

be observed in accordance with Federal Data Privacy Laws (§ 20<br />

and § 35)<br />

Protocol data:<br />

After weekly evaluation of the protocol data, 2 MB must be stored<br />

regularly for one year or until checks are conducted by the Data<br />

Privacy Officer.<br />

Confidentiality requirements<br />

<strong>The</strong> confidentiality requirement of a file also applies to any backup copy.<br />

When adding backup copies with the same confidentiality requirement on to<br />

one data medium, this can result in an increased confidentiality requirement of<br />

the data stored. Consequently, specifications must be made as to the<br />

confidentiality requirements of the individual data blocks needing backup, as<br />

well as the data combinations which have a higher degree of confidentiality<br />

than the original data.<br />

Sample result 8: Confidentiality requirements<br />

Software:<br />

Low confidentiality requirement as these are publicly available data,<br />

only copyright regulations must be observed<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!