Secure Data Storage and Handling


Secure data storage and handling are essential practices that protect organisational data from loss, misuse, and unauthorised access. Applying appropriate storage controls and responsible handling methods helps maintain data integrity, reliability, and trust while supporting effective data use across systems and teams (NIST, 2020; Von Solms and Van

Technique Overview

Secure Data Storage and Handling

Secure Data Storage and Handling Definition

Secure data storage and handling refer to the practices used to store, access, manage, share, and maintain data in ways that protect its confidentiality, integrity, and availability. This includes selecting appropriate storage environments, applying access controls, limiting duplication, and managing data throughout its lifecycle. Effective practices reduce risk arising from technical weaknesses and human behaviour while supporting reliable and responsible data use (NIST, 2020; Siponen and Oinas-Kukkonen, 2007).

Secure Data Storage and Handling Description *

* The full technique overview will be available soon. Contact us to register your interest in our business management platform, and learn all about Secure Data Storage and Handling.

Business Evidence

Strengths, weaknesses and examples of Secure Data Storage and Handling *

* The business evidence section is for premium members only. Please contact us about accessing the Business Evidence.

Business Application

Implementation, success factors and measures of Secure Data Storage and Handling *

* The business application section is for premium members only. Please contact us about accessing the Business application.

Professional Tools

Secure Data Storage and Handling videos and downloads *

* The professional tools section is for premium members only. Please contact us about accessing the professional tools.

Further Reading

Secure Data Storage and Handling web and print resources *

Secure Data Storage and Handling references (4 of up to 20) *

  • ST (2020). Security and Privacy Controls for Information Systems and Organizations. [online] csrc.nist.gov. Available at: https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final.
  • International Organization for Standardization (2022). ISO/IEC 27001 standard – information security management systems. [online] ISO. Available at: https://www.iso.org/standard/27001.
  • Siponen, M.T. and Oinas-Kukkonen, H. (2007). A review of information security issues and respective research contributions. ACM SIGMIS Database, 38(1), p.60. doi:https://doi.org/10.1145/1216218.1216224
  • Von Solms, R. and Van Niekerk, J. (2013). From Information Security to Cyber Security. Computers & Security, [online] 38(1), pp.97–102. doi:https://doi.org/10.1016/j.cose.2013.04.004

* The further reading section is for premium members only. Please contact us about accessing the further reading.


Learn more about KnowledgeBrief Manage and how you can equip yourself with the knowledge to succeed on Secure Data Storage and Handling and hundreds of other essential business management techniques

Other members were also interested in...

Related Concept: Introduction to Presenting Data Analysis Results

Data analysis has little impact if the results are unclear or misinterpreted. Presenting findings effectively requires structure, precision and clarity so that insight is understood rather than assumed. Professional communication of results transforms output into meaning that supports informed judgement and action.