The tools and techniques to protect information and information systems from unauthorized access and use and to support an organization's legal and regulatory obligations.
Security
The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction.
Records Management
A set of activities required for systematic control of creation, receipt, classification, maintenance, use and disposition of recorded information maintained as evidence of business activities and transactions.
Data Privacy
The protection of personally identifiable information.
Digital Rights Management
Access control technologies used to limit the use of digital content and devices. Technology that inhibits uses of digital content that is not desired or intended by the content provider.
Archiving
The practice of long-term preservation of records with enduring business or historical value.
E-Discovery
The process of legal discovery carried out in electronic formats. Includes electronically stored information data mapping.