{"id":98848,"date":"2022-12-23T11:00:00","date_gmt":"2022-12-23T02:00:00","guid":{"rendered":"https:\/\/learningbox.online\/?p=98848"},"modified":"2022-12-23T11:00:00","modified_gmt":"2023-03-30T02:15:24","slug":"blog-secret-confidential-information-difference","status":"publish","type":"post","link":"https:\/\/learningbox.online\/en\/column\/blog-secret-confidential-information-difference\/","title":{"rendered":"Handling Confidential Information at Workplace"},"content":{"rendered":"<p class=\"wp-block-paragraph\">Corporate activities involve handling a wide range of information about the company's customers and business partners. Many of the data and documents used in business contain confidential and sensitive information. Such information must be handled with care because its leakage outside the company could lead to serious problems.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">This article explains the definition of confidential information and countermeasures against information leaks.<\/p>\r\n\r\n\r\n\r\n<div id=\"toc\"><\/div>\r\n\r\n\r\n\r\n<h2 class=\"is-style-heading__l wp-block-heading\">Confidential Information<\/h2>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"871\" height=\"457\" src=\"https:\/\/learningbox.online\/wp-content\/uploads\/blog\/secret_confidential_information_difference_01.jpg\" alt=\"blog\" class=\"wp-image-98875\" srcset=\"https:\/\/learningbox.online\/wp-content\/uploads\/blog\/secret_confidential_information_difference_01.jpg 871w, https:\/\/learningbox.online\/wp-content\/uploads\/blog\/secret_confidential_information_difference_01-300x157.jpg 300w, https:\/\/learningbox.online\/wp-content\/uploads\/blog\/secret_confidential_information_difference_01-768x403.jpg 768w, https:\/\/learningbox.online\/wp-content\/uploads\/blog\/secret_confidential_information_difference_01-18x9.jpg 18w\" sizes=\"auto, (max-width: 871px) 100vw, 871px\" \/><\/figure>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">There are some types of confidential and sensitive information. We explore each of them below.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"is-style-heading__m wp-block-heading\">Definition<\/h3>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-underline-yellow-color\">Sensitive information can specify and damage the organization or individuals if it is disclosed.<\/mark>It includes biometric or financial information, passports etc., which is so called personally identifiable information (PII). To protect this information, it will be indispensable for being encrypted in transit.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">In business,<mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-underline-yellow-color\">&nbsp;sensitive information includes anything that could damage the organization.<\/mark>\u00a0Not only customer data but also trade secrets, financial data and any plans that it possesses, etc., are all regarded as confidential. In other words, confidential information is what individuals or organizations do not want disclosed with other groups or individuals.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"is-style-heading__m wp-block-heading\">Examples<\/h3>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">For enterprises, each department or division has different types of confidential information as follows.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">They can be broadly classified into five categories: management information, financial and accounting information, R&amp;D and technical information, human resources information, and marketing and public relations information.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">\u3010Types of Information\u3011<\/p>\r\n\r\n\r\n\r\n<table border=\"1\" style=\"width: 100%;\">\r\n<tbody>\r\n<tr>\r\n<th style=\"width: 40%; text-align: center; background-color: #f5f5f5; font-weight: bold; border-color: #c0c0c0;\">Type of information<\/th>\r\n<th style=\"width: 60%; text-align: left; background-color: #f5f5f5; font-weight: bold; border-color: #c0c0c0;\">\u3000Examples<\/th>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 40%; text-align: center; vertical-align: middle;\">Management<\/td>\r\n<td style=\"width: 60%; text-align: left; vertical-align: middle;\">\u3000Business plans, inventory, M&amp;A, etc.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 40%; text-align: center; vertical-align: middle;\">Financial and Accounting<\/td>\r\n<td style=\"width: 60%; text-align: left; vertical-align: middle;\">\u3000Budget and sales, financing, joint venture plans, etc.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 40%; text-align: center; vertical-align: middle;\">R&amp;D<\/td>\r\n<td style=\"width: 60%; text-align: left; vertical-align: middle;\">\u3000Design drawings, study reports, project specifications, etc.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 40%; text-align: center; vertical-align: middle;\">Personnel<\/td>\r\n<td style=\"width: 60%; text-align: left; vertical-align: middle;\">\u3000Salary, promotion, transfer, etc.<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 40%; text-align: center; vertical-align: middle;\">Marketing and Public Relations<\/td>\r\n<td style=\"width: 60%; text-align: left; vertical-align: middle;\">\u3000Sales history, sales promotion, customers, business partners, etc.<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\"><br><\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">As written above, each organization has a variety of confidential information. Not only employees but customers and business partners are all related and it must be treated properly and safely protected. It should be noted that data of order history and browsing history is classified as personal information and can be confidential information as well.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"is-style-heading__m wp-block-heading\">Non-Disclosure Agreement (NDA)<\/h3>\r\n\r\n\r\n\r\n<h4 class=\"is-style-heading__s wp-block-heading\">Definition<\/h4>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">A Non-Disclosure Agreement (NDA) is one type of legal confidentiality agreement. According to Investopedia, it bends one or more parties to non-disclosure of confidential or proprietary information.<\/p>\r\n\r\n\r\n\r\n<div class=\"frame-gray\">\r\n<p class=\"wp-block-paragraph\">\u201cA confidentiality agreement is often used in situations wherein sensitive corporate information or proprietary knowledge is not to be made available to the general public or to competitors.\u201d<\/p>\r\n\r\n\r\n\r\n<p class=\"mb-0 wp-block-paragraph translation-block\"><a href=\"https:\/\/www.investopedia.com\/terms\/c\/confidentiality_agreement.asp\"><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Some companies often require new employees to sign NDAs. This will result in a deterrent effect on preventing information leaks from employees, and protecting the company itself if they happen.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">&nbsp;<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\"><br class=\"br-trp\" \/><a href=\"https:\/\/www.investopedia.com\/terms\/n\/nda.asp#toc-what-is-a-non-disclosure-agreement-nda\" data-type=\"URL\" data-id=\"https:\/\/www.meti.go.jp\/policy\/economy\/chizai\/chiteki\/pdf\/1706tradesec.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">References: Non-Disclosure Agreement (NDA) Explained, With Pros and Cons by Investopedia<\/a><\/p>\r\n\r\n\r\n\r\n<h4 class=\"is-style-heading__s wp-block-heading\">Types of Confidential Information<\/h4>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Sensitive information is classified as some categories. One is confidential information shared only with people in the organization. This means external parties such as business partners or customers are not allowed to know the content. Examples include meeting minutes and employment regulations. This information could lead to risks if leaked and must be protected.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Depending on its level of importance, confidential information is treated as \"Top Secret,\" \"Secret,\" or \"Outside Confidential\" in descending order of confidentiality. Certain information classified as \"Top Secret\" or \"Secret\" is considered to be more vulnerable to loss due to leakage, and can only be accessed by a limited number of people within the organization.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Therefore, some information with the higher level of confidentiality will not be shared even within the organization nor department.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"is-style-heading__s wp-block-heading\">Personal data<\/h4>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">In the categories of sensitive information, personal data is also included and requires careful handling. Leakage of this kind of information may expose individuals to social risks such as discrimination or cause psychological damage.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Not only personal email address or phone numbers, this information includes an individual's political views, religious beliefs, race or ethnicity, and place of birth or legal domicile. Each organization requires careful handling of personal data to protect an individual's privacy.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">In terms of NDA, personal data is not included since the agreement is subject to the organization.<\/p>\r\n\r\n\r\n\r\n<a class=\"for_mokuji\" href=\"#toc\">Back to Contents<\/a>\r\n\r\n\r\n\r\n<h2 class=\"is-style-heading__l wp-block-heading\">Business Risks<\/h2>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"871\" height=\"457\" src=\"https:\/\/learningbox.online\/wp-content\/uploads\/blog\/information_leak_risk_list_01.jpg\" alt=\"blog\" class=\"wp-image-98558\" srcset=\"https:\/\/learningbox.online\/wp-content\/uploads\/blog\/information_leak_risk_list_01.jpg 871w, https:\/\/learningbox.online\/wp-content\/uploads\/blog\/information_leak_risk_list_01-300x157.jpg 300w, https:\/\/learningbox.online\/wp-content\/uploads\/blog\/information_leak_risk_list_01-768x403.jpg 768w, https:\/\/learningbox.online\/wp-content\/uploads\/blog\/information_leak_risk_list_01-18x9.jpg 18w\" sizes=\"auto, (max-width: 871px) 100vw, 871px\" \/><\/figure>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">What risks are posed to a company if confidential and sensitive information is leaked? This section elaborates on business risks.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"is-style-heading__m wp-block-heading\">Loss of Trust<\/h3>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Widespread negative reputation from information leaks can lose trust in many ways. For business, the impact will spread to clients, customers, suppliers and future business partners and more. In this society, it will also be a threat that such reputation can trigger a false rumor circulating through social media, which will result in further reputational damage. These elements can cause financial damage as a consequence, which means information leaks impact company management itself.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"is-style-heading__m wp-block-heading\">Compensation for Damages<\/h3>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">When it comes to another negative side of information leaks, it should be taken into account that an organization can be required to pay compensation for victims of them. There have been cases of large-scale personal information leaks in the past, in which companies have paid compensation to their customers for damages.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">The more sensitive the information, the more serious the damage from a leak can be.<\/p>\r\n\r\n\r\n  <a href=\"\/en\/column\/blog-information-leak-risk-list\/\" class=\"relatedArticle__hover\">\n\t  <div class=\"relatedArticle\">\n      <div class=\"relatedArticle__thumbnail\">\n        <img decoding=\"async\" src=\"https:\/\/learningbox.online\/wp-content\/uploads\/blog\/en\/en_information_leak_risk_list_00.jpg\" alt=\"thumbnail (i.e. miniature image)\">\n      <\/div> \n      <div class=\"relatedArticle__content\">\n        <div class=\"relatedArticle__title\">\n          <p>Data Breaches Threats and Countermeasures<\/p>\n        <\/div>\n        <div class=\"relatedArticle__excerpt\">\n          <p>The majority of information leaks are caused by human error by employees. Improving internal information security education will help reduce the risk. In this issue, we introduce the risks that information leaks pose to companies, measures to prevent their occurrence, and the response flow in the event of an outbreak.<\/p>\n        <\/div>\n      <\/div>\n      <div class=\"arrow-16 f-16\"><\/div>\n    <\/div>\n  <\/a>\n\r\n\r\n\r\n<a class=\"for_mokuji\" href=\"#toc\">Back to Contents<\/a>\r\n\r\n\r\n\r\n<h2 class=\"is-style-heading__l wp-block-heading\">Countermeasures<\/h2>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"871\" height=\"457\" src=\"https:\/\/learningbox.online\/wp-content\/uploads\/blog\/secret_confidential_information_difference_02.jpg\" alt=\"blog\" class=\"wp-image-98874\" srcset=\"https:\/\/learningbox.online\/wp-content\/uploads\/blog\/secret_confidential_information_difference_02.jpg 871w, https:\/\/learningbox.online\/wp-content\/uploads\/blog\/secret_confidential_information_difference_02-300x157.jpg 300w, https:\/\/learningbox.online\/wp-content\/uploads\/blog\/secret_confidential_information_difference_02-768x403.jpg 768w, https:\/\/learningbox.online\/wp-content\/uploads\/blog\/secret_confidential_information_difference_02-18x9.jpg 18w\" sizes=\"auto, (max-width: 871px) 100vw, 871px\" \/><\/figure>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">To prevent information leaks, it plays an important role to strictly adhere to company rules on a daily basis and maintain an up-to-date secure environment. The following explain a couple of countermeasures.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"is-style-heading__m wp-block-heading\">Device Management<\/h3>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">In terms of digital devices, they need to be well-managed including bringing in and using any media capable of storing confidential and sensitive information within the organization. For instance, carrying data on USB memory sticks or external hard disks carries the risk of loss or theft.<br>Likewise, employees\u2019 personal devices should be strictly managed for business purposes.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">It is also important to stipulate and clearly state rules restricting where company-owned devices can be taken out of the office and where they can be used. New management methods may be introduced to keep information assets safe, requiring employees to apply in advance when taking digital devices out of the office.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">With the proliferation of teleworking, urgent countermeasures are required for stricter enforcement of these rules.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"is-style-heading__m wp-block-heading\">Software Security<\/h3>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Install security software on company-owned devices to protect sensitive data from computer viruses and unauthorized access. Periodic updates of software are also indispensable for data protection.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Keep your software up-to-date to protect data from new cybercrime tactics.<\/p>\r\n\r\n\r\n\r\n<h3 class=\"is-style-heading__m wp-block-heading\">Security Awareness Training<\/h3>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Employee awareness plays an important role to keep your company's confidential and sensitive information safe. Appropriate handling of sensitive information and understanding the importance of information security will result in protecting data in your organization. As a countermeasure, HR professionals should take into consideration to implement security awareness training for every employee.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">For training, elearning system will be a big help in that admin can track each employee progress.<\/p>\r\n\r\n\r\n\r\n<a class=\"for_mokuji\" href=\"#toc\">Back to Contents<\/a>\r\n\r\n\r\n\r\n<h2 class=\"is-style-heading__l wp-block-heading\">Summary<\/h2>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Along with the fast-changing digital society, each organization is facing challenges to protect confidential information. While installing security software is one of the effective methods, further countermeasures will be required to improve employees' awareness toward information security.<br>As written above, introducing an elearning system will contribute to track employees\u2019 progress and assess their understanding.<\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\">Since employees\u2019 awareness will result in protecting confidential information by human error, HR professionals need to take actions to improve their performance.<a href=\"https:\/\/learningbox.online\/en\/learningbox-on\/\" data-type=\"URL\" data-id=\"https:\/\/learningbox.online\/learningbox-on\/\">learningBOX ON<\/a>\u00a0learningBOX is one of the effective learning management systems. You can create your original quizzes, upload PDF or videos, and other varieties of content in one learning environment. Auto-scoring is available as default and you can track employees' learning progress easily.<br><br><\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/learningbox.online\/en\/learningbox-on\/content-security\/\" data-type=\"URL\" data-id=\"https:\/\/learningbox.online\/learningbox-on\/content-security\/\"><br class=\"br-trp\" \/><\/a>\u00a0and&nbsp;<a href=\"https:\/\/learningbox.online\/en\/learningbox-on\/content-business-manner-2\/\" data-type=\"URL\" data-id=\"https:\/\/learningbox.online\/learningbox-on\/content-compliance\/\">&nbsp;<\/a><p>There will be something you can do to improve your work environment.<\/p><\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\"><br><\/p>\r\n\r\n\r\n\r\n<p class=\"wp-block-paragraph\"><strong>\u25bcYou may also like:<\/strong><\/p>\r\n\r\n\r\n  <a href=\"\/en\/column\/blog-information-security-training-e-learning\/\" class=\"relatedArticle__hover\">\n\t  <div class=\"relatedArticle\">\n      <div class=\"relatedArticle__thumbnail\">\n        <img decoding=\"async\" src=\"https:\/\/learningbox.online\/wp-content\/uploads\/blog\/en\/en_information_security_training_e_learning_00-1.jpg\" alt=\"thumbnail (i.e. miniature image)\">\n      <\/div> \n      <div class=\"relatedArticle__content\">\n        <div class=\"relatedArticle__title\">\n          <p>Data Security Training with Elearning to Employees<\/p>\n        <\/div>\n        <div class=\"relatedArticle__excerpt\">\n          <p>When conducting in-house information security training, we recommend the use of an e-learning system. In this issue, we will introduce how to select a service to conduct information security training via e-learning, as well as useful information for creating content. We hope you will find it useful.<\/p>\n        <\/div>\n      <\/div>\n      <div class=\"arrow-16 f-16\"><\/div>\n    <\/div>\n  <\/a>\n\r\n\r\n\r\n<a class=\"for_mokuji\" href=\"#toc\">Back to Contents<\/a>","protected":false},"excerpt":{"rendered":"In the course of business activities, we handle a wide range of information about our customers and business partners. Many of the data and documents used in business operations contain confidential and sensitive information...","protected":false},"author":6,"featured_media":98854,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"template-column.php","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","content-type":"","_lmt_disableupdate":"yes","_lmt_disable":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_vk_print_noindex":"","_veu_custom_css":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[395],"tags":[364,401],"class_list":["post-98848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-info-security","tag-learningbox-on","tag-401"],"acf":[],"modified_by":"i.hirota","jetpack_featured_media_url":"https:\/\/learningbox.online\/wp-content\/uploads\/blog\/confidential_secret_information_difference_00.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pgWaOl-pIk","_links":{"self":[{"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/posts\/98848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/comments?post=98848"}],"version-history":[{"count":27,"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/posts\/98848\/revisions"}],"predecessor-version":[{"id":103543,"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/posts\/98848\/revisions\/103543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/media\/98854"}],"wp:attachment":[{"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/media?parent=98848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/categories?post=98848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/learningbox.online\/en\/wp-json\/wp\/v2\/tags?post=98848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}