{"id":1769,"date":"2018-12-03T13:28:26","date_gmt":"2018-12-03T13:28:26","guid":{"rendered":"https:\/\/iso27001.solutions\/?p=1769"},"modified":"2019-03-11T18:06:04","modified_gmt":"2019-03-11T18:06:04","slug":"designing-an-information-management-scheme","status":"publish","type":"post","link":"https:\/\/ismsalliance.com\/trends\/iso-27001-isms-risk-management\/designing-an-information-management-scheme\/","title":{"rendered":"Designing an information management scheme"},"content":{"rendered":"

What is an information management scheme ?<\/h2>\n
\n
\n
\n
\n

An information management scheme provides a framework within which information can be identified,\u00a0its security requirements determined and instructions given to those who may handle it. Although it may\u00a0be tempting to have the information management scheme echo the full complexity of an educational organisation, this is not desirable and should not be necessary. A complex scheme is too easy to misunderstand and mistakes could expose the organisation to significant risks. The aim should be to have the simplest scheme that will satisfy the organisation\u2019s requirements: identifying this is likely to involve a series of iterations between theoretical and practical considerations. The most effective schemes take a pragmatic approach that can be understood by all their users.<\/p>\n

An information management scheme, in a simple form, can be made up as follows:<\/strong><\/p>\n