1 / 13

Data security and positions with access to confidential information

Data security and positions with access to confidential information. Agenda. About the audit Audit findings Control space of E-Government: Report Cases. About the audit. Part of the 2011 audit into the state of central government accounts

Télécharger la présentation

Data security and positions with access to confidential information

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data security and positions with access to confidentialinformation

  2. Agenda • About the audit • Audit findings • Control space of E-Government: • Report • Cases Data security and positions with access to confidential information| February 18th 2013

  3. About the audit • Part of the 2011 audit into the state of central government accounts • We performed audits at all the ministries and one departmental agency intoInformation Security ( IS): • Quality of data protection policy; • Protection of data systems. • We examined Positions with access to Confidential Information at all the ministries. ( PCI) • Audit start: October 2011 • Audit publication: May 2012 Data security and positions with access to confidential information| February 18th 2013

  4. Audit findings IS - Qualityof data protection policy • Most ministries and departmental agencies score badly in the following two respects: • It is not clear who is responsible for which data systems and data chains. • No regular reviews of data protection policy have been planned or performed. Data security and positions with access to confidential information| February 18th 2013

  5. Audit findingsIS - Protection of data systems • Poor scores in the two following areas in particular: • No clear picture of the security risks associated with data systems; • The overall package of reliability requirements and security measures is not reviewed at regular intervals. Data security and positions with access to confidential information| February 18th 2013

  6. Audit findingsPCI - results

  7. Control space of E-Government – The form Data security and positions with access to confidential information| February 18th 2013

  8. Control space of E-Government – Case IS: Quality of data protection policy Data security and positions with access to confidential information| February 18th 2013

  9. Control space of E-Government– Case PCI: Positionswith access toconfidential information Data security and positions with access to confidential information| February 18th 2013

  10. Control space of E-Government – Headline Data security and positions with access to confidential information| February 18th 2013

  11. Let’sseehowthis looks like…. Data security and positions with access to confidential information| February 18th 2013

  12. www.rekenkamer.nl@rekenkamerwww.linkedin.com/company/algemene-rekenkamerwww.rekenkamer.nl@rekenkamerwww.linkedin.com/company/algemene-rekenkamer

More Related