Maintain data security when using digital technology

URN: TECHDUDS1
Business Sectors (Suites): IT Users
Developed by: e-skills
Approved on: 30 Mar 2022

Overview

This standard is about protecting data within a digital technology system against unauthorised access that could impact the integrity of that data.

It involves implementing the organisational strategy for cyber security and identifying any threats and risks that may arise, reporting any security issues according to organisational policies. It includes implementing the correct user authentication procedures to access different systems and using and updating unique passwords. It also includes implementing anti-virus protection software and maintaining good backup procedures for data.

This standard is for those who need to maintain data security when using digital technologies to meet their own needs or as part of their duties.


Performance criteria

You must be able to:

  1. Take appropriate security precautions when working online in line with organisational standards

  2. Run specified security software to protect data in digital systems from viruses and malware

  3. Maintain secure access privileges to digital systems by using unique and secure passwords to protect privacy and security, in line with organisational procedures

  4. Follow secure practices when extracting and sharing data in line with organisational guidelines

  5. Conduct online transactions safely and securely in line with organisational guidelines
  6. Manage the selection strong passwords to keep data secure in line with organisational procedures

  7. Take precautions to protect digital devices against unauthorised access, loss or theft in line with organisational data protection policies

  8. Identity incoming emails of concern and act in line with organisational standards
  9. Check the security of websites using approved procedures, before entering personal or organisational data
  10. Comply with laws, regulations and organisational policies when using data in digital systems
  11. Report data security breaches promptly and in line with organisational standards

Knowledge and Understanding

You need to know and understand:

  1. How data can be stored, used and shared
  2. The risks associated with storing and sharing data
  3. The main sources of risks to data
  4. The concept of password strength
  5. The general principles of keeping data secure
  6. The hazards that can exist in emails targeting phishing attacks
  7. The laws, regulations and organisational guidelines governing the security of digital systems and data
  8. How to report breaches of data security or suspicious activity
  9. The dangers of computer viruses, and how to minimise risks
  10. The risks to data security from internal sources
  11. The risks to privacy when working online
  12. How to identify secure internet sites
  13. The risks associated with downloading software

Scope/range


Scope Performance


Scope Knowledge


Values


Behaviours


Skills


Glossary


Links To Other NOS


External Links


Version Number

1

Indicative Review Date

30 Mar 2025

Validity

Current

Status

Original

Originating Organisation

ODAG Consultants Ltd.

Original URN

TECHDUDS1

Relevant Occupations

ICT for Users

SOC Code

4159

Keywords

information security, data security