Modern technologies of protection and processing of confidential documentary information in organizations and institutions of different forms of ownership
DOI:
https://doi.org/10.32461/2409-9805.4.2021.249320Abstract
The purpose of the article is to establish the features and types of modern documentary information that
has intellectual value; finding out the principles on which to build a secure document flow; characteristics of
the main technological stages and procedures for the implementation of confidential documents; identifying
threats that may arise during this process. The methodology consisted of a set of general scientific, special
scientific and specific methods of studying the problem, the application of which allows to achieve the goal.
Scientific intelligence was based on the principles of objectivity and integrity. The use of a set of scientific
methods made it possible to study the specifics of valuable documentary information, to find out the main
channels of information leakage, to trace the stages of document circulation of such business papers. Scientific
novelty. The latest international practices of working with confidential documents are studied. Features
and types of documentary information that has intellectual value for the entrepreneur are established. The
principles on which it is necessary to build a secure document flow are formulated. The main technological
stages and procedures of execution of confidential documents are outlined. The main threats that may arise
during this process have been identified. Conclusions. Confidential information allows any company to operate
successfully due to the security of information. The importance of such information determines the risk of its
loss. In order to avoid inconveniences related to the loss or theft of information, the institutions should create
appropriate services, whose representatives monitor confidential information, document circulation, create
databases for computers and files for paper media, destroy drafts of confidential documents, store and destroy
documents that are valuable in the prescribed manner.
Keywords: execution of a confidential document, secrecy stamp, information protection, technological
complexity, value of documentary information.
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Марина Цілина
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).