Secure Data Storage and Handling
Secure data storage and handling are essential practices that protect organisational data from loss, misuse, and unauthorised access. Applying appropriate storage controls and responsible handling methods helps maintain data integrity, reliability, and trust while supporting effective data use across systems and teams (NIST, 2020; Von Solms and Van
Technique Overview
Secure Data Storage and Handling Definition
Secure data storage and handling refer to the practices used to store, access, manage, share, and maintain data in ways that protect its confidentiality, integrity, and availability. This includes selecting appropriate storage environments, applying access controls, limiting duplication, and managing data throughout its lifecycle. Effective practices reduce risk arising from technical weaknesses and human behaviour while supporting reliable and responsible data use (NIST, 2020; Siponen and Oinas-Kukkonen, 2007).
Secure Data Storage and Handling Description *
* The full technique overview will be available soon. Contact us to register your interest in our business management platform, and learn all about Secure Data Storage and Handling.
Business Evidence
Strengths, weaknesses and examples of Secure Data Storage and Handling *
* The business evidence section is for premium members only. Please contact us about accessing the Business Evidence.
Business Application
Implementation, success factors and measures of Secure Data Storage and Handling *
* The business application section is for premium members only. Please contact us about accessing the Business application.
Professional Tools
Secure Data Storage and Handling videos and downloads *
* The professional tools section is for premium members only. Please contact us about accessing the professional tools.
Further Reading
Secure Data Storage and Handling web and print resources *
Secure Data Storage and Handling references (4 of up to 20) *
- ST (2020). Security and Privacy Controls for Information Systems and Organizations. [online] csrc.nist.gov. Available at: https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final.
- International Organization for Standardization (2022). ISO/IEC 27001 standard – information security management systems. [online] ISO. Available at: https://www.iso.org/standard/27001.
- Siponen, M.T. and Oinas-Kukkonen, H. (2007). A review of information security issues and respective research contributions. ACM SIGMIS Database, 38(1), p.60. doi:https://doi.org/10.1145/1216218.1216224
- Von Solms, R. and Van Niekerk, J. (2013). From Information Security to Cyber Security. Computers & Security, [online] 38(1), pp.97–102. doi:https://doi.org/10.1016/j.cose.2013.04.004
* The further reading section is for premium members only. Please contact us about accessing the further reading.
Learn more about KnowledgeBrief Manage and how you can equip yourself with the knowledge to succeed on Secure Data Storage and Handling and hundreds of other essential business management techniques