Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
Classification level IV (RESTRICTED)
1. Classified material that is in the electronic format is destroyed securely. The destruction is carried out with methods which are secure enough to prevent reconstruction in whole or in part of destroyed information. Concerning non-electronic information, see F-08.4.
Classification level III (CONFIDENTIAL): in addition to point 1
2. When international CONFIDENTIAL information is concerned, a destruction certificate
has to be signed by the registrar and stored in the registry. Registry information has to be
updated accordingly. The destruction certificates will be stored in the registry for at least
five years. (see F-08.3).
Classification level II (SECRET): in addition to points 1 and 2 above
3. In case the originator of the information is another authority, the authority destructing information shall inform the originator about the destruction, unless
the information is returned to the originating authority.
4. Information may be only destructed by a person who has been nominated for the task by an authority. Draft documents may be destroyed by the originator.
5. International information belonging to classification level SECRET has to be destroyed in the presence of a witness. The witness has to be security cleared
at least to the level the information to be destroyed.
Classification level IV (RESTRICTED)
1. Classified material that is in the electronic format is destroyed securely. The destruction is carried out with methods which are secure enough to prevent reconstruction in whole or in part of destroyed information. Concerning non-electronic information, see F-08.4.
Classification level III (CONFIDENTIAL): in addition to point 1
2. When international CONFIDENTIAL information is concerned, a destruction certificate
has to be signed by the registrar and stored in the registry. Registry information has to be
updated accordingly. The destruction certificates will be stored in the registry for at least
five years. (see F-08.3).
Classification level II (SECRET): in addition to points 1 and 2 above
3. In case the originator of the information is another authority, the authority destructing information shall inform the originator about the destruction, unless
the information is returned to the originating authority.
4. Information may be only destructed by a person who has been nominated for the task by an authority. Draft documents may be destroyed by the originator.
5. International information belonging to classification level SECRET has to be destroyed in the presence of a witness. The witness has to be security cleared
at least to the level the information to be destroyed.
In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.
In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.
When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.