The structure and scale of information value
Classification of information resources
The value of information can be a value category and characterize a specific amount of profit when using it or the amount of losses when it is lost. The degree of value of information and the necessary reliability of its protection are directly related.
Information often becomes valuable due to its legal significance for a company or business development, for example, constituent documents, programs and plans, contracts with partners and intermediaries, etc. Value may manifest itself in its promising scientific, technical or technological significance.
It should be borne in mind that the document can be not only managerial (business), but in most cases it has a text, tabular or questionnaire form. Large volumes of the most valuable documents are presented in pictorial form: design documents, cartographic, scientific and technical, documents on photographic, magnetic and other media. In accordance with this, two types of intellectually valuable information are usually distinguished:
technical, technological: methods of manufacturing products, software, production indicators, chemical formulas, formulations, test results of prototypes, quality control data, etc.;
business: cost indicators, market research results, customer lists, economic forecasts, etc.
According to the type of ownership, information resources can be state or non-state, owned by citizens, public authorities, executive bodies, local governments, state institutions, organizations and enterprises, and public organizations.
Any official documented information, the misuse of which may cause damage to its owner, owner, user and other person, is subject to protection. Thus, the existence of ownership of information as a result of intellectual activity determines the legal expediency of protecting information resources. There is also an economic feasibility of protecting information resources based on the consumer properties of information, primarily on its cost.
In accordance with the interests of ensuring national security and the degree of value to the state, as well as legal, economic and other interests, information resources can be open, that is, publicly available (used in work without special permission, published in the media, announced in speeches, etc.), and limited access and use, that is containing information that constitutes a particular type of secret and is subject to protection, protection, and surveillance.
It is forbidden to refer to restricted access information:
legislative and other normative acts establishing the legal status of state authorities, executive bodies, local self-government bodies, organizations, public associations, as well as the rights, freedoms and obligations of citizens, the procedure for their implementation;
documents containing information on emergency situations, environmental, meteorological, demographic, sanitary-epidemiological and other information necessary to ensure the safe functioning of settlements, industrial facilities, the safety of citizens and the general population;
documents containing information on the activities of state authorities, executive bodies and local self-government bodies, on the use of budgetary funds and other state and local resources, on the condition and needs of the population, with the exception of information related to state secrets;
documents accumulated in open collections of bibliotech and archives, information systems of public authorities, executive bodies, local governments, organizations, public associations, representing public interest or necessary for the realization of the rights, freedoms and duties of citizens.
Valuable information is protected by the norms of law (patent, copyright, related rights, etc.), a trademark, or is protected by including it in the category of information constituting a certain type of secret.
For information resources of limited access, the type of secrecy is the determining basis for their classification. A mystery is something unknown, unknown, unsolved, not yet known, something hidden from others, not known to everyone. There are two global subject areas of mystery:
the mysteries of nature, that is, objective mysteries: the mystery of the universe, the mysteries of birth and death, and many other mysteries;
secrets of people, that is, subjective secrets: secrets of personality, secrets of production, secrets of art, etc.
The concept of secrecy includes not only documented information, but also databases, products, products, technologies, radiation, and physical fields. The variety of forms and subjects of ownership gives the owner the right to consider this or that valuable information a secret.
The composition of types of secrecy in modern Russian legislation is constantly expanding. Currently, the main types of secrecy are: state, official, professional, commercial and personal. Each of these species has several subspecies.
State secret is information protected by the state in the field of military, foreign policy, economic, intelligence, counterintelligence and operational investigative activities, the dissemination of which may harm the security of the Russian Federation. The basics of protecting state secrets are regulated by the Law of the Russian Federation dated 07/21/1993 No. 5485-1 "On State Secrets".
Other types of secrecy are non-governmental. Information is classified as restricted access information in accordance with the procedure established by the legislation of the Russian Federation, in accordance with the List of confidential information approved by Decree of the President of the Russian Federation dated 03/06/1997 No. 188.
Official secrets contain information of limited distribution, which includes unclassified information related to the activities of the organization, restrictions on the dissemination of which are dictated by official necessity.
Official information includes information that is not subject to publication in the media, use in open documents, disclosure at conferences, negotiations and exhibitions, for example drafts and versions of documents being prepared, official instructions, negotiating tactics, personal data of employees, etc. Varieties of official secrets can be called judicial and investigative secrets, secrets of state banks, industrial secrecy (before its patenting) in the non-commercial sphere, etc.
Professional secrecy is a tool for protecting personal data about citizens and personal secrets of citizens. It means that this information has been transferred by their owner or is at the disposal of an organization and is necessary for it to carry out professional activities: medical secrecy, insurance secrecy, probate secrecy, voting secrecy, communications secrecy, tax secrecy, etc. A professional secret can also be the secret of mastery, the secret of professional skill, for example, the secret of creativity, the secret of the innovator, etc.
Commercial secret is information that has actual or potential commercial value due to its unknown to third parties, when there is no free access to it on a legitimate basis and the owner of this information takes measures to protect their confidentiality. Given that trade secrets as such reflect to a large extent trade secrets, sometimes the term "business secret" is used within the same definition. In foreign practice, terms are usually used that divide an entrepreneurial secret into two parts - industrial and commercial. Trade secrets are considered as a prerequisite for fair competition of enterprises in the market of goods or services. In Russia, a trade secret covers a non-governmental sphere or commercial areas of industrial activity and includes industrial, financial, scientific and other subspecies of secrecy. Within this type of secret, the commercial secret of the bank (banking secret), the secret of the company is distinguished. Trade secrets include the secrets of the enterprises with which the company cooperates, the secrets of customers, buyers, suppliers, etc.
The personal secret of citizens is defined in the Constitution of the Russian Federation, which states that everyone has the right to privacy, personal and family secrets, protection of their honor and good name. Everyone has the right to privacy of correspondence, telephone conversations, postal, telegraphic and other communications. It is not allowed to collect, store, use and disseminate information about the private life of citizens without their consent. A family secret can be considered a kind of personal secret. It is a secret of several persons related by kinship, for example: property status, views and beliefs, family relations, the secret of the fact of adoption.
The process of identifying and regulating the real composition of restricted access information is important for the effective operation of the information security system.
For example, limited access information is generated in the following areas of an enterprise's activity:
forecasting and planning activities (expansion or curtailment of production, development programs, investment plans);
enterprise management (information on preparation and decision-making, applied management methods);
financial activities (balance sheet, information on the status of accounts and the level of profitability, information on obtaining loans);
trading activities (information on market strategy, on the effectiveness of commercial activities);
production activities (production facilities, type of equipment used, stocks of raw materials and finished products);
negotiations and meetings on the company's activities (information on the preparation and results of negotiations);
formation of pricing policy for products and services (information on the price structure, calculation methods, discount amounts);
formation of the composition of partners, suppliers and consumers;
studying the composition of competitors;
participation in auctions and auctions;
scientific and research activities for the creation of new equipment and technologies;
the use of new technologies;
recruitment and personnel management;
organization of enterprise security.
When determining the composition of information of a limited amount, it is necessary to identify the key elements of information that are the main carriers of the secret. Information can be classified as a trade secret if the following conditions are met:
the information should not reflect the negative aspects of the company's activities;
the information should not be publicly available or publicly known;
the occurrence or receipt of information must be legitimate and associated with the expenditure of the material, financial or intellectual potential of the enterprise;
the staff should be aware of the value of such information and trained in the rules of working with it;
real actions should be taken to protect this information (availability of a protection system, regulatory, methodological and technical support for this system).
In accordance with the decree of the Government of the Russian Federation "On the list of information that cannot constitute a trade secret" dated December 5, 1991, confidential information cannot be classified:
constituent documents, charters of business structures;
documents granting the right to engage in entrepreneurial activity (registration certificates, licenses, patents);
information on established forms of reporting on financial and economic activities and other information necessary to verify the correctness of the calculation and payment of taxes and other mandatory payments to the state budget system of the Russian Federation;
documents on solvency;
information on the number, composition of employees, their wages and working conditions, as well as the availability of available jobs;
documents on payment of taxes and mandatory payments;
information about environmental pollution, violation of antimonopoly legislation, non-compliance with safe working conditions, sale of products harmful to public health, as well as other violations of the legislation of the Russian Federation and the amount of damage caused;
information on the participation of company officials in cooperative, small enterprises, partnerships, joint-stock companies, associations and other organizations engaged in entrepreneurial activities.
The composition of valuable confidential information to be protected is determined by its owner or owner.
Enterprises of the same type can be guided by the approximate composition of the protected information.
When determining the value of information, it is necessary to determine the possible damage from the implementation of security threats. When determining damage, it is important to evaluate it in terms of value: the cost of products that will not be produced or sold, the cost of scientific research, etc.
In practice, the composition of protected information is recorded in a special List of confidential information. A list of documents that do not contain confidential information, but are of value to the enterprise and are subject to protection (for example, the charter, contract, etc.) is also determined. (A list of valuable and confidential documents).
Thus, valuable information is included in documents that are part of information resources with limited access to them by personnel. According to the type of secrecy resources belong to, documents are divided into secret and unclassified. A mandatory feature of a secret document is the presence of information in it that constitutes a state secret. Unclassified documents that include information classified as a non-state secret or contain personal data are called confidential.
A mandatory feature of a confidential document is the presence of information in it that is subject to protection.
Restricted access documents include:
in government agencies: documents, draft documents and related materials related to official information of limited distribution (documents "for official use") containing information classified as official secrets, having a working nature and not subject to publication in the open press;
in business structures - documents containing information that the owner or the owner, in accordance with the law, has the right to attribute to a commercial (entrepreneurial) secret, the secret of mastery;
regardless of affiliation - documents and databases that record any personal (personal) data about citizens, as well as containing professional secrets, technical and technological innovations (before patenting them), secrets of communications companies, service industries, etc
. It is not allowed to call restricted access documents secret or put a security stamp on them.
The restriction of access to documents has a significant range in terms of the restriction of free access to them by personnel (from several hours to a significant number of years). It should be borne in mind that the bulk of confidential documents lose their value and confidentiality after the completion of their execution or work with them. For example, correspondence before the conclusion of a contract may have a confidentiality stamp, but after signing it, this stamp is removed. The executed documents remaining confidential, which retain value for the company's activities, are formed into cases in accordance with the nomenclature of cases.
The period of restriction of access to documents can be short-term or long-term, depending on the value of the information contained in the documents. The period of access restriction is determined by the above list of confidential information and depends on the specifics of the company's activities. For example, manufacturing, research and development firms have more valuable documents than trade, intermediary, etc.
Documents of a long-term access restriction period (business development programs and plans, technological documentation of know-how, inventions, etc.) have a complicated processing and storage option that ensures the security of information and its carrier.
Documents of a short-term access restriction period that are of operational importance for the company's activities are processed and stored according to a simplified scheme and may not stand out from the technological system for processing open documents if there are minimal protective, control and analytical elements in this system.
The restriction of access to personal data is lifted in cases of depersonalization of this data or after 75 years of their storage period, unless otherwise specified by law.