Please enable JavaScript.
Coggle requires JavaScript to display documents.
Information Security, Ethics, and Legislation - Coggle Diagram
Information Security, Ethics, and Legislation
CIA Triad
Confidentiality
Authorized access only
Encryption, authentication, secure credentials
Integrity
Accurate, consistent, and reliable data
Validation controls, audits, backups
Availability
Timely access to information
Redundancy, mirror servers, disaster recovery plans
-
Personal Data
name, ID, address, medical records, financial profile, etc.
Legal frameworks
GDPR (EU), Latin American laws (Mexico, Colombia, Argentina, Brazil, Panama)
ARCO Rights: access, rectification, cancellation, opposition
-
Cybersecurity
Protects against digital threats (malware, phishing, ransomware, espionage)
Measures: firewalls, multifactor authentication, AI-based anomaly detection, contingency plans
-
Information Governance
-
-
Oversight, traceability, transparency
-
Convergence
Security + governance = resilience, trust, innovation
Legal compliance + social legitimacy
Information Evaluation, Quality, and Flow
-
Information Lifecycle
Main stages
Capture: Data collection (manual, automated, or hybrid).
Importance: clear criteria, validation, avoid overload.
Processing: Organize, clean, analyze, and visualize data.
-
Storage: Secure and efficient data storage (servers, cloud, blockchain).
Consider security, accessibility, and legal compliance.
Dissemination: Provide relevant, timely, and secure information.
Communication strategy, access levels, suitable formats.
Information Quality
Monitoring and evaluation (M&E) systems, KPIs.
-
Process maps, traceability matrices, quality management tools (Six Sigma, Lean, ISO 9001).
Quality criteria
International standards: ISO 8000, ISO/IEC 25012, ISO/IEC 27001.
-
Objective: % incomplete records, errors, inconsistencies.
-
-
-
-