Share to: share facebook share twitter share wa share telegram print page

Information sensitivity

Classified intelligence material found at Donald Trump's residence during an FBI search

Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others.[1] Loss, misuse, modification, or unauthorized access to sensitive information can adversely affect the privacy or welfare of an individual, trade secrets of a business or even the security and international relations of a nation depending on the level of sensitivity and nature of the information.[2]

Non-sensitive information

Public information

This refers to information that is already a matter of public record or knowledge. With regard to government and private organizations, access to or release of such information may be requested by any member of the public, and there are often formal processes laid out for how to do so.[3] The accessibility of government-held public records is an important part of government transparency, accountability to its citizens, and the values of democracy.[4] Public records may furthermore refer to information about identifiable individuals that is not considered confidential, including but not limited to: census records, criminal records, sex offender registry files, and voter registration.

Routine business information

This includes business information that is not subjected to special protection and may be routinely shared with anyone inside or outside of the business.

Types of sensitive information

Confidential information is used in a general sense to mean sensitive information whose access is subject to restriction, and may refer to information about an individual as well as that which pertains to a business.

However, there are situations in which the release of personal information could have a negative effect on its owner. For example, a person trying to avoid a stalker will be inclined to further restrict access to such personal information. Furthermore, a person's SSN or SIN, credit card numbers, and other financial information may be considered private if their disclosure might lead to crimes such as identity theft or fraud.

Some types of private information, including records of a person's health care, education, and employment may be protected by privacy laws. [5] Unauthorized disclosure of private information can make the perpetrator liable for civil remedies and may in some cases be subject to criminal penalties.

Even though they are often used interchangeably, personal information is sometimes distinguished from private information, or personally identifiable information.[6] The latter is distinct from the former in that Private information can be used to identify a unique individual. Personal information, on the other hand, is information belonging to the private life of an individual that cannot be used to uniquely identify that individual. This can range from an individual's favourite colour, to the details of their domestic life.[7] The latter is a common example of personal information that is also regarded as sensitive, where the individual sharing these details with a trusted listener would prefer for it not to be shared with anyone else, and the sharing of which may result in unwanted consequences.

Confidential business information

Confidential business information (CBI) refers to information whose disclosure may harm the business. Such information may include trade secrets, sales and marketing plans, new product plans, notes associated with patentable inventions, customer and supplier information, financial data, and more.[8]

Under TSCA, CBI is defined as proprietary information, considered confidential to the submitter, the release of which would cause substantial business injury to the owner. The US EPA may as of 2016, review and determine if a company´s claim is valid.[9]

Classified

Classified information generally refers to information that is subject to special security classification regulations imposed by many national governments, the disclosure of which may cause harm to national interests and security. The protocol of restriction imposed upon such information is categorized into a hierarchy of classification levels in almost every national government worldwide, with the most restricted levels containing information that may cause the greatest danger to national security if leaked. Authorized access is granted to individuals on a need to know basis who have also passed the appropriate level of security clearance. Classified information can be reclassified to a different level or declassified (made available to the public) depending on changes of situation or new intelligence.

Classified information may also be further denoted with the method of communication or access. For example, Protectively Marked "Secret" Eyes Only or Protectively Marked "Secret" Encrypted transfer only. Indicating that the document must be physically read by the recipient and cannot be openly discussed for example over a telephone conversation or that the communication can be sent only using encrypted means. Often mistakenly listed as meaning for the eyes of the intended recipient only[10] the anomaly becomes apparent when the additional tag "Not within windowed area" is also used.

Personal and private information

Data privacy concerns exist in various aspects of daily life wherever personal data is stored and collected, such as on the internet, in medical records, financial records, and expression of political opinions. In over 80 countries in the world, personally identifiable information is protected by information privacy laws, which outline limits to the collection and use of personally identifiable information by public and private entities. Such laws usually require entities to give clear and unambiguous notice to the individual of the types of data being collected, its reason for collection, and planned uses of the data. In consent-based legal frameworks, explicit consent of the individual is required as well.[11]

The EU passed the General Data Protection Regulation (GDPR), replacing the earlier Data Protection Directive. The regulation was adopted on 27 April 2016. It became enforceable from 25 May 2018 after a two-year transition period and, unlike a directive, it does not require national governments to pass any enabling legislation, and is thus directly binding and applicable.[12] "The proposed new EU data protection regime extends the scope of the EU data protection law to all foreign companies processing data of EU residents. It provides for a harmonisation of the data protection regulations throughout the EU, thereby making it easier for non-European companies to comply with these regulations; however, this comes at the cost of a strict data protection compliance regime with severe penalties of up to 4% of worldwide turnover."[13] The GDPR also brings a new set of "digital rights" for EU citizens in an age when the economic value of personal data is increasing in the digital economy.

In Canada, the Personal Information Protection and Electronic Documents Act (PIPEDA) regulates the collection and use of personal data and electronic documents by public and private organizations. PIPEDA is in effect in all federal and provincial jurisdictions, except provinces where existing privacy laws are determined to be “substantially similar”.[14]

Even though not through the unified sensitive information framework, the United States has implemented significant amount of privacy legislation pertaining to different specific aspects of data privacy, with emphasis to privacy in healthcare, financial, e-commerce, educational industries, and both on federal and state levels. Whether being regulated or self regulated, the laws require to establish ways at which access to sensitive information is limited to the people with different roles, thus in essence requiring establishment of the "sensitive data domain" model[15] and mechanisms of its protection. Some of the domains have a guideline in form of pre-defined models such as "Safe Harbor" of HIPAA,[16] based on the research of Latanya Sweeny and established privacy industry metrics.

Additionally, many other countries have enacted their own legislature regarding data privacy protection, and more are still in the process of doing so.[17]

Confidential business information

The confidentiality of sensitive business information is established through non-disclosure agreements, a legally binding contract between two parties in a professional relationship. NDAs may be one-way, such as in the case of an employee receiving confidential information about the employing organization, or two-way between businesses needing to share information with one another to accomplish a business goal. Depending on the severity of consequences, a violation of non-disclosure may result in employment loss, loss of business and client contacts, criminal charges or a civil lawsuit, and a hefty sum in damages.[18] When NDAs are signed between employer and employee at the initiation of employment, a non-compete clause may be a part of the agreement as an added protection of sensitive business information, where the employee agrees not to work for competitors or start their own competing business within a certain time or geographical limit.

Unlike personal and private information, there is no internationally recognized framework protecting trade secrets, or even an agreed-upon definition of the term “trade secret”.[19] However, many countries and political jurisdictions have taken the initiative to account for the violation of commercial confidentiality in their criminal or civil laws. For example, under the US Economic Espionage Act of 1996, it is a federal crime in the United States to misappropriate trade secrets with the knowledge that it will benefit a foreign power, or will injure the owner of the trade secret.[20] More commonly, breach of commercial confidentiality falls under civil law, such as in the United Kingdom.[21] In some developing countries, trade secret laws are either non-existent or poorly developed and offer little substantial protection.[22]

Classified information

In many countries, unauthorized disclosure of classified information is a criminal offence, and may be punishable by fines, prison sentence, or even the death penalty, depending on the severity of the violation.[23][24] For less severe violations, civil sanctions may be imposed, ranging from reprimand to revoking of security clearance and subsequent termination of employment.[25]

Whistleblowing is the intentional disclosure of sensitive information to a third-party with the intention of revealing alleged illegal, immoral, or otherwise harmful actions.[26] There are many examples of present and former government employees disclosing classified information regarding national government misconduct to the public and media, in spite of the criminal consequences that await them.

Espionage, or spying, involves obtaining sensitive information without the permission or knowledge of its holder. The use of spies is a part of national intelligence gathering in most countries, and has been used as a political strategy by nation-states since ancient times. It is unspoken knowledge in international politics that countries are spying on one another all the time, even their allies.[27]

Digital sensitive information

Computer security is information security applied to computing and network technology, and is a significant and ever-growing field in computer science. The term computer insecurity, on the other hand, is the concept that computer systems are inherently vulnerable to attack, and therefore an evolving arms race between those who exploit existing vulnerabilities in security systems and those who must then engineer new mechanisms of security.

A number of security concerns have arisen in the recent years as increasing amounts of sensitive information at every level have found their primary existence in digital form. At the personal level, credit card fraud, internet fraud, and other forms of identity theft have become widespread concerns that individuals need to be aware of on a day-to-day basis. The existence of large databases of classified information on computer networks is also changing the face of domestic and international politics. Cyber-warfare and cyber espionage is becoming of increasing importance to the national security and strategy of nations around the world, and it is estimated that 120 nations around the world are currently actively engaged in developing and deploying technology for these purposes.[28]

Philosophies and internet cultures such as open-source governance, hacktivism, and the popular hacktivist slogan "information wants to be free" reflects some of the cultural shifts in perception towards political and government secrecy. The popular, controversial WikiLeaks is just one of many manifestations of a growing cultural sentiment that is becoming an additional challenge to the security and integrity of classified information.[29]

See also

References

  1. ^ Mothersbaugh, David L.; Foxx, William K.; Beatty, Sharon E.; Wang, Sijun (2011-12-20). "Disclosure Antecedents in an Online Service Context: The Role of Sensitivity of Information". Journal of Service Research. 15 (1): 76–98. doi:10.1177/1094670511424924. ISSN 1094-6705. S2CID 168122924.
  2. ^ "2.2 - Information Classification | Unit 2 | OCR Cambridge Technicals". CSNewbs. Retrieved 2023-05-20.
  3. ^ "Accessing Public Information" Information and Privacy Commissioner, Ontario, Canada. Retrieved Feb. 11 2013.
  4. ^ ""Accountability and Transparency: Essential Principles" Democracy Web. Retrieved Feb. 11, 2013". Archived from the original on 2023-11-18. Retrieved 2013-02-12.
  5. ^ Rights (OCR), Office for Civil (2008-05-07). "Your Rights Under HIPAA". HHS.gov. Retrieved 2022-08-28.
  6. ^ Shelest, Dmytri (2024-02-07). "What are data brokers? The secret economy of your personal information". onerep. Retrieved 2024-04-03.
  7. ^ "Private and Personal Information" Archived 2016-03-24 at the Wayback Machine Common Sense Media Inc., 2013. Retrieved Feb. 9 2013.
  8. ^ "Confidential information and trade secrets" MaRS, Dec. 8 2009. Retrieved Feb. 9 2013.
  9. ^ US EPA, OCSPP (2015-04-22). "CBI Claims and Reviews Under TSCA". www.epa.gov. Retrieved 2023-03-01.
  10. ^ "Eyes-only".
  11. ^ "Basic Privacy" Archived 2023-11-13 at the Wayback Machine (lecture). University of Toronto, Jan. 24, 2012. Retrieved Feb. 9 2013.
  12. ^ Blackmer, W.S. (5 May 2016). "GDPR: Getting Ready for the New EU General Data Protection Regulation". Information Law Group. InfoLawGroup LLP. Archived from the original on 14 May 2018. Retrieved 22 June 2016.
  13. ^ "New draft European data protection regime". Law Patent Group. February 2, 2012. Retrieved January 9, 2018.
  14. ^ "DEPARTMENT OF INDUSTRY: PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT" Archived 2013-06-02 at the Wayback Machine Canada Gazette, Apr. 03 2002. Retrieved Feb. 9 2013.
  15. ^ "Sensitive Data Discovery"
  16. ^ "Methods for De-identification of PHI". 7 September 2012.
  17. ^ "International Privacy Laws " Archived 2023-12-02 at the Wayback Machine InformationShield. Retrieved Feb. 9 2013.
  18. ^ Niznik, J. S. "Non-Disclosure Agreement" Archived 2013-01-16 at the Wayback Machine About.com, 2002. Retrieved Feb. 9 2013.
  19. ^ Magri, K. A. "International Aspects of Trade Secrets Law" 1997. Retrieved Feb. 9 2013.
  20. ^ 104th US Congress. "ECONOMIC ESPIONAGE ACT OF 1996" Archived 2023-11-18 at the Wayback Machine PUBLIC LAW 104–294, OCT. 11, 1996. Retrieved Feb. 9 2013.
  21. ^ Bently, L. "Breach of confidence - the basics" (lecture). Retrieved Feb. 9 2013.
  22. ^ Kransdorf, G. "Intellectual Property, Trade, and Technology Transfer Law: The United States and Mexico" Boston College Third World Law Journal 7(2): 277-295. 1987. Retrieved Feb. 9 2013.
  23. ^ 113th US Congress. "Disclosure of classified information" Legal Information Institute, Cornell University Law School. Retrieved Feb. 9 2013.
  24. ^ "Charges in Classified Information and National Security Cases" Archived 2023-11-13 at the Wayback Machine James Madison Project, Retrieved Feb. 9 2013.
  25. ^ Elsea, J. K. "The Protection of Classified Information: The Legal Framework" Congressional Research Service, Jan. 10 2013. Retrieved Feb. 9 2013.
  26. ^ Morley, H., Cohen-Lyons, J. "WHISTLEBLOWING IN THE PUBLIC SECTOR: A BALANCE OF RIGHTS AND INTERESTS" Public Sector Digest, Spring 2012. Pp 16-18. Retrieved Feb. 9 2013.
  27. ^ Woolsey, R. J. "Why We Spy on Our Allies" The Wall Street Journal: Mar. 17 2000. Retrieved Feb. 9 2013.
  28. ^ Brodkin, J. "Government-sponsored cyberattacks on the rise, McAfee says" Archived 2013-06-17 at the Wayback Machine Networked World: Nov. 29 2007. Retrieved Feb. 9 2013.
  29. ^ Ludlow, P. "WikiLeaks and Hacktivist Culture" The Nation: Sep. 15 2010. Retrieved Feb. 9 2013.

Read other articles:

نهر إبراهيم (نهر)     المنطقة البلد لبنان  الخصائص الطول 30 كيلومتر  المصب البحر الأبيض المتوسط  مساحة الحوض 326 كيلومتر مربع  تعديل مصدري - تعديل   تبين الصورة نهر إبراهيم   لمعانٍ أخرى، طالع نهر إبراهيم (توضيح). 34°04′N 35°39′E / 34.067°N 35.650°E / 34.067; 35...

Kota BalikpapanKotaDari atas ke bawah, kiri ke kanan: Kota Balikpapan, Tugu Adipura, dan Pelabuhan Balikpapan LambangJulukan: Kota MinyakMotto: Manuntung(Banjar) kerja tuntas dan totalitasPetaKota BalikpapanPetaTampilkan peta KalimantanKota BalikpapanKota Balikpapan (Indonesia)Tampilkan peta IndonesiaKoordinat: 1°08′56″S 116°54′11″E / 1.1489°S 116.9031°E / -1.1489; 116.9031Negara IndonesiaProvinsiKalimantan TimurHari jadi10 Februari 1897Jumla...

دوار الرملة تقسيم إداري البلد المغرب  الجهة فاس مكناس الإقليم تاونات الدائرة غفساي الجماعة القروية سيدي يحيى بني زروال المشيخة أولاد صالح السكان التعداد السكاني 355 نسمة (إحصاء 2004)   • عدد الأسر 75 معلومات أخرى التوقيت ت ع م±00:00 (توقيت قياسي)[1]،  وت ع م+01:00 (توقيت صيف...

Nanc-lès-Saint-Amour Entidad subnacional Nanc-lès-Saint-AmourLocalización de Nanc-lès-Saint-Amour en FranciaCoordenadas 46°25′22″N 5°21′31″E / 46.422777777778, 5.3586111111111Entidad Comuna de Francia y Comuna delegada • País  Francia • Región Borgoña-Franco Condado • Departamento Jura • Distrito Lons-le-Saunier • Cantón Saint-Amour • Mancomunidad Comunidad de comunas Puerta de Jura • Comuna Les Trois-Châ...

مسجد ليبوه اتشيه إحداثيات 5°24′52″N 100°20′10″E / 5.4144722222222°N 100.33619444444°E / 5.4144722222222; 100.33619444444  معلومات عامة القرية أو المدينة بينانغ الدولة  ماليزيا تاريخ بدء البناء 1808 معلومات أخرى تعديل مصدري - تعديل   مسجد ليبوه اتشيه (بالملايو: Lebuh Aceh masjid ) هو مسجد يعود بنائه إل

Town in Samogitia Region, Lithuania City in Samogitia, LithuaniaTelšiaiCityLeft to right:Telšiai CathedralCuria of the Roman Catholic Diocese of TelšiaiTourism CenterChurch of the Assumption of the Blessed Virgin Mary into Heaven, TelšiaiTelšiai Tower FlagCoat of armsTelšiaiLocation within LithuaniaShow map of LithuaniaTelšiaiLocation within the Baltic StatesShow map of Baltic statesTelšiaiLocation within EuropeShow map of EuropeCoordinates: 55°59′0″N 22°15′0″E / &#x...

Juan Luis II Príncipe de Anhalt-Zerbst Reinado 1742 - 1747Información personalNacimiento 23 de junio de 1688DornburgFallecimiento 5 de noviembre de 1746ZerbstFamiliaCasa real Casa de AscaniaPadre Príncipe Juan Luis I de Anhalt-DornburgMadre Cristina Leonor de Zeutsch[editar datos en Wikidata] El príncipe Juan Luis II de Anhalt-Zerbst (23 de junio de 1688, Dornburg - 5 de noviembre de 1746, Zerbst) fue un príncipe alemán de la Casa de Ascania y gobernante del principado de Anha...

La Guardia La Guardia en conciertoDatos generalesOrigen Granada  EspañaEstado ActivoInformación artísticaGénero(s) RockCountry RockPop RockPeríodo de actividad 1983–19972003-ActualidadDiscográfica(s) Vale MusicDiagonal MusicZafiro RecordsWebSitio web Web OficialMiembros Manuel EspañaJavi CanoCarlos MuñozPaco VillamayorExmiembros Juan Enrique Moreno (Conejo)†Joaquín Almendros García (Quini)Emilio Muñoz[editar datos en Wikidata] La Guardia es una banda de...

State park in Minnesota, United States Split Rock Lighthouse State ParkSplit Rock Lighthouse State Park seen from the shore of Lake SuperiorLocation of Split Rock Lighthouse State Park in MinnesotaShow map of MinnesotaSplit Rock Lighthouse State Park (the United States)Show map of the United StatesLocationLake, Minnesota, United StatesCoordinates47°11′31″N 91°23′34″W / 47.19194°N 91.39278°W / 47.19194; -91.39278Area2,200 acres (8.9 km2)Elevation728...

Large caliber rifle Solothurn S-18/1100 20 mm Anti-Tank Rifle A 20 mm Solothurn S-18/1100 AA-Mount at the Museum Altes Zeughaus Solothurn, Switzerland.TypeLarge caliber rifleAnti-tank rifleAnti-aircraft gunPlace of originSwitzerlandService historyUsed bySwitzerlandHungaryItalyNazi GermanyThe NetherlandsWarsWorld War IIProduction historyProduced1936—VariantsSolothurn S-18/100Solothurn S-18/1000SpecificationsMass54.7 kg (121 lb)Length2.1 m (6 ft 11 in)B...

2003 film by David Zucker Scary Movie 3Theatrical release posterDirected byDavid ZuckerWritten by Craig Mazin Pat Proft Based onCharactersby Shawn WayansMarlon WayansBuddy JohnsonPhil BeaumanJason FriedbergAaron SeltzerProduced byRobert K. WeissStarring Anna Faris Anthony Anderson Kevin Hart Leslie Nielsen Camryn Manheim Simon Rex George Carlin Queen Latifah Eddie Griffin Denise Richards Regina Hall Charlie Sheen CinematographyMark IrwinEdited byJon PollMusic byJames L. VenableProductioncompa...

2003 studio album by GO!GO!7188TategamiStudio album by GO!GO!7188Released26 February 2003GenreRockLength55:30LabelToshiba-EMI -- TOCT-24980GO!GO!7188 chronology Tora no Ana(2002) Tategami(2003) Kyu Ni Ichi Jiken(2003) Tategami (鬣, Tategami) is a 2003 album by GO!GO!7188. The title translates as mane in English.[1] Track listing All lyrics are written by Akiko Hamada; all music is composed by Yumi Nakashima, except where otherwise notedNo.TitleLyricsMusicLength1.Umashika mono...

2010 soundtrack album by Hans Zimmer and Lorne BalfeMegamind: Music from the Motion PictureSoundtrack album by Hans Zimmer and Lorne BalfeReleasedNovember 2, 2010GenreClassical, rockLength48:10LabelLakeshore RecordsProducerSkip WilliamsonHans Zimmer chronology Inception(2010) Megamind: Music from the Motion Picture(2010) How Do You Know(2010) Lorne Balfe chronology Sherlock Holmes(2009)(2009) Megamind(2010)(2010) The Dilemma(2011)(2011) Megamind: Music from the Motion Picture is a sou...

Webcomic by Faith Erin Hicks Demonology 101Author(s)Faith Erin HicksWebsitefaith.rydia.netCurrent status/scheduleConcludedLaunch dateAugust 1999 (1999-08)End dateJune 2004 (2004-06)Genre(s)Fantasy/Drama Demonology 101 (sometimes abbreviated as D101) is a webcomic written and drawn by Faith Erin Hicks from August 1999 to June 2004. It tells the story of Raven, a 16-year-old demon being raised by a human in ordinary human society. Hicks' first public work gained attention as...

Elections in the District of Columbia Federal government Presidential elections 1964 1968 1972 1976 1980 1984 1988 1992 1996 2000 2004 2008 2012 2016 2020 2024 Presidential primaries Democratic 2004 2008 2016 2020 2024 Republican 2008 2016 2020 2024 U.S. House elections 1871 1872 1971 1972 1974 1976 1978 1980 1982 1984 1986 1988 1990 1992 1994 1996 1998 2000 2002 2004 2006 2008 2010 2012 2014 2016 2018 2020 2022 2024 Shadow Senator elections 1990 1994 1996 2000 2002 2006 2008 2012 2014 2018 2...

after dark First edition (Japanese)AuthorHaruki MurakamiOriginal titleアフターダークAfutā DākuTranslatorJay RubinCountryJapanLanguageJapanesePublisherKodansha (Japan)Harvill Press (UK)Alfred A. Knopf (US)Publication date2004Published in EnglishMay 2007Media typePrint (Hardcover)Pages208ISBN0-307-26583-8 (US)1-84655-047-5 (UK)OCLC81861840 After Dark (アフターダーク, Afutā Dāku) is a 2004 novel by Japanese author Haruki Murakami.[1] Plot summary Set in m...

Defunct UK computer magazine This article is about the magazine. For the Canadian rewards program formerly called PC Plus, see PC Optimum. For The herbal supplement PC-PLUS, see PC-SPES. PC PlusCover from 2003EditorMartin CooperCategoriesComputer magazineFrequencyMonthlyFounded1986Final issueSeptember 2012CompanyFuture plcCountryUnited KingdomLanguageEnglishWebsiteweb.archive.org/web/20080416215415/http://www.pcplus.co.uk/homeISSN0952-2565 PC Plus was a computer magazine published monthly fro...

1958 Northwestern movie Wolf DogFilm posterDirected bySam NewfieldWritten byLouis StevensProduced bySam NewfieldStarringJim DavisAllison HayesCinematographyFrederick FordEdited byDouglas RobertsonMusic byJohn BathProductioncompanyRegal Films IncDistributed by20th Century-FoxRelease date July 1958 (1958-07) (United States) Running time69 minutesCountriesUnited StatesCanadaLanguageEnglish Wolf Dog, also known as A Boy and His Dog, is a 1958 Western film directed and produced by Sa...

Bolivian police in La Paz. Crime in Bolivia is investigated by the Bolivian police. Crime by type Murder Further information: List of countries by intentional homicide rate Bolivia has a homicide rate of 6.3 murders per 100,000 people.[1] There were 686 reported homicides in 2016.[1] In 2012, Bolivia had a murder rate of 12.1 per 100,000 population.[2] There were a total of 1,270 murders in Bolivia in 2012.[2] Illegal drug trade Further information: Illegal dru...

Church in Rogaland, NorwaySola ChapelSola kapellView of the church58°53′24″N 5°37′09″E / 58.89013°N 5.61904°E / 58.89013; 5.61904LocationSola Municipality,RogalandCountryNorwayDenominationChurch of NorwayChurchmanshipEvangelical LutheranHistoryFormer name(s)Sola kirkeStatusParish churchFoundedc. 1140Consecrated1955ArchitectureFunctional statusActiveArchitect(s)Gustav HellandArchitectural typeLong churchCompleted1955SpecificationsCapacity300MaterialsStoneAdm...

Kembali kehalaman sebelumnya