1 / 17

The Government Protective Marking System (GPMS)

The Government Protective Marking System (GPMS). by Information Assurance. v4 - last amended 18/01/11. Why The Need?. In association with Government compliance requirements, the MCA must ensure its systems, processes and people protect valuable information assets in order to:.

reuben
Download Presentation

The Government Protective Marking System (GPMS)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Government Protective Marking System (GPMS) by Information Assurance v4 - last amended 18/01/11

  2. Why The Need? In association with Government compliance requirements, the MCA must ensure its systems, processes and people protect valuable information assets in order to: • improve information asset awareness • promote information security • maintain business continuity

  3. What’s The Purpose? To indicate that information stored electronically or contained in a document has a particular level of security, which … • needs to be protected to a certain standard The GPMS also, • ensures information receives a uniform level of protection and treatment within the MCA

  4. What’s an Information Asset? This is a definable piece of information, stored in any manner which is recognized as ‘valuable’ to the MCA. For example: • files • system documentation • user manuals • procedures • archived information • personal data • USB Memory Sticks • DVDs • CDs

  5. What are the correct protective markings to use? • TOP SECRET • SECRET • CONFIDENTIAL • RESTRICTED • PROTECT In order of sensitivity the MCA classifies information into five levels:

  6. What about Unclassified Information? NOT PROTECTIVELY MARKED Certain information assets may be considered ‘unclassified’, but should still be marked with: This positively indicates that a protective marking is not needed

  7. What needs marking? • Everything … • Paper files, e-mails (including attachments) • DVDs • CDs • USB Memory Sticks

  8. Where to place a GPMS • paper assets top and bottom (back and front) of each page – in bold • CDs, DVDs and USB Memory Sticks permanent marker pen – in bold and before data is written to the media

  9. Remember! Information Assets must be clearly marked at all times

  10. What are Descriptors? • RESTRICTED STAFF • PROTECT PERSONAL • PROTECT COMMERCIAL These are supplementary markings applied to protectively marked assets to indicate additional information about contents, sensitivity or handling requirements. For example;

  11. What is Personal Data? Personal data is viewed as any information that links one or more identifiable living person with information about them whose release would put them at significant risk of harm or distress. Correct application of a protective marking will ensure personal data is appropriately safeguarded.

  12. Name & address (home, business or both) Postcode e-mail address Telephone Number Date of birth Driving Licence Number Financial data Tax information National Insurance Number Medical details Employment records PROTECT PERSONAL must be used when handling information which includes one of the following Combinedwith

  13. Assessing Information

  14. For the handling of CONFIDENTIAL and above please contact the Data Handling Manager at MCA HQ

  15. How can I apply a PM? • Use a ‘harm test’ to indicate likely impact if asset were compromised … • Assess asset against criteria for each PM • Too high PM = hinder use and cause business inefficiency • Too low PM = damaging consequences and asset compromise

  16. Everyone needs to be aware of their responsibility towards protecting the confidentiality, integrity and availability of all information assets belonging to the MCA. Please refer to the Procedure on Information Security Classification for further guidance.

  17. Link to M-net: Information Assurance http://m3net.mcga.gov.uk/c4mca/mnet-corporatesupport/mnet-corpdev/mnet-ia.htm PM

More Related