Page 55 - CISSO_Prep_ Guide
P. 55

The information owner must ensure that information that
            requires protection is adequately protected. That means only
            authorized personnel can access that information, the data is
            being correctly backed up, and the data is destroyed when no
            longer needed. It also means that the data can only be changed
            through a controlled process.

            Going back to the integration of many departments of the
            organization, we see that information that is gathered by one
            department may soon be transmitted or available to another
            department. This demonstrates why the role of the information
            owner is enterprise-wide instead of department-wide. The
            system owner is usually from one department and only has
            responsibility for the systems in their department. The
            information owner has the responsibility to protect data that may
            end up on several networks in more than one department. The
            burden of the information owner is to ensure that sensitive data
            is protected no matter where in the organization it goes. The
            information owner is the person who must accept legal
            responsibility for protecting that information and possibly facing
            some form of criminal or civil charges if the information is
            breached. This means that the information owner must be a
            senior manager and must have the authority to mandate how a
            piece of data will be gathered, stored, accessed, and transmitted.
            This includes when data is deleted regardless of what systems or
            departments the information belongs to. This includes when
            information is shared with business partners or handled by a
            third party. How this works in practice is that the information
            owner declares what information is protected and how it is to be
            processed. For example, a credit card number may be collected
            on a sales system but subsequently stored on a financial system
            or in a customer database. The information owner must mandate
   50   51   52   53   54   55   56   57   58   59   60