Page 56 - CISSO_Prep_ Guide
P. 56

whether the information must be protected while being stored or
            transmitted (encrypted), accessed, deleted, and displayed
            (masked). Each system owner that processes, stores, or transmits
            that credit card data must agree to follow the mandate of the
            information owner. The system owner must be willing to
            enforce necessary protections on that data according to the order
            of the information owner. The information owner must have the
            authority to refuse to allow that information to be available to
            the sales system or department. Through this, we see the
            enterprise-wide mandate of the information owner. This is one
            of the most challenging aspects of information protection -
            especially given the many different laws and regulations about
            the handling of information. Sometimes the rules for handling
            data are different from one country to another or one industry
            sector to another, and the information owner or owners must be
            able to adjust to those various laws as much as possible.



            Custodian
            The role of the custodian is to have cared for, or custody of, an
            asset. The custodian of a sports trophy (ex. the Stanley Cup for
            Ice Hockey) is not the owner of the Cup but is tasked with the
            responsibility for the protection of the Cup - the secure handling,
            storage, transportation, display, and engraving of the trophy on
            behalf of the owner. This is the same as the role of IT. IT
            manages, cares for, operates, and repairs the systems of the
            organization on behalf of the system owners and information
            owners. IT has a level of access to information that no one else
            has, but with that access comes the responsibility to behave in a
            legal, ethical manner and not misuse, disclose or modify that
            data or system in an unauthorized way. There are far too many
            examples of IT staff reading emails, accessing customer data, or
   51   52   53   54   55   56   57   58   59   60   61