DSP-17: Are processes, procedures, and technical measures defined and implemented
to protect sensitive data throughout its lifecycle?
Information rights management technology should be used and applied (when applicable) to all sensitive data. This technology can add a security layer that will help protect files from unauthorized copying, viewing, printing, forwarding, deleting, and editing.
Control implemented
Control ownership
Description
Define and implement, processes, procedures and technical measures
to protect sensitive data throughout it's lifecycle.