The Government Protective Marking System (GPMS) - PowerPoint PPT Presentation

the government protective marking system gpms n.
Skip this Video
Loading SlideShow in 5 Seconds..
The Government Protective Marking System (GPMS) PowerPoint Presentation
Download Presentation
The Government Protective Marking System (GPMS)

play fullscreen
1 / 17
The Government Protective Marking System (GPMS)
Download Presentation
Download Presentation

The Government Protective Marking System (GPMS)

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. The Government Protective Marking System (GPMS) by Information Assurance v4 - last amended 18/01/11

  2. Why The Need? In association with Government compliance requirements, the MCA must ensure its systems, processes and people protect valuable information assets in order to: • improve information asset awareness • promote information security • maintain business continuity

  3. What’s The Purpose? To indicate that information stored electronically or contained in a document has a particular level of security, which … • needs to be protected to a certain standard The GPMS also, • ensures information receives a uniform level of protection and treatment within the MCA

  4. What’s an Information Asset? This is a definable piece of information, stored in any manner which is recognized as ‘valuable’ to the MCA. For example: • files • system documentation • user manuals • procedures • archived information • personal data • USB Memory Sticks • DVDs • CDs

  5. What are the correct protective markings to use? • TOP SECRET • SECRET • CONFIDENTIAL • RESTRICTED • PROTECT In order of sensitivity the MCA classifies information into five levels:

  6. What about Unclassified Information? NOT PROTECTIVELY MARKED Certain information assets may be considered ‘unclassified’, but should still be marked with: This positively indicates that a protective marking is not needed

  7. What needs marking? • Everything … • Paper files, e-mails (including attachments) • DVDs • CDs • USB Memory Sticks

  8. Where to place a GPMS • paper assets top and bottom (back and front) of each page – in bold • CDs, DVDs and USB Memory Sticks permanent marker pen – in bold and before data is written to the media

  9. Remember! Information Assets must be clearly marked at all times

  10. What are Descriptors? • RESTRICTED STAFF • PROTECT PERSONAL • PROTECT COMMERCIAL These are supplementary markings applied to protectively marked assets to indicate additional information about contents, sensitivity or handling requirements. For example;

  11. What is Personal Data? Personal data is viewed as any information that links one or more identifiable living person with information about them whose release would put them at significant risk of harm or distress. Correct application of a protective marking will ensure personal data is appropriately safeguarded.

  12. Name & address (home, business or both) Postcode e-mail address Telephone Number Date of birth Driving Licence Number Financial data Tax information National Insurance Number Medical details Employment records PROTECT PERSONAL must be used when handling information which includes one of the following Combinedwith

  13. Assessing Information

  14. For the handling of CONFIDENTIAL and above please contact the Data Handling Manager at MCA HQ

  15. How can I apply a PM? • Use a ‘harm test’ to indicate likely impact if asset were compromised … • Assess asset against criteria for each PM • Too high PM = hinder use and cause business inefficiency • Too low PM = damaging consequences and asset compromise

  16. Everyone needs to be aware of their responsibility towards protecting the confidentiality, integrity and availability of all information assets belonging to the MCA. Please refer to the Procedure on Information Security Classification for further guidance.

  17. Link to M-net: Information Assurance PM