Classify information into different security groups based on their risk exposure and degree of sensitivity. Review this classification regularly.
Approve access rights on the basis of a practical application
of the need-to-know, need-to-do and need-to-use
principles, i.e. only those staff with a genuine need to use
classified information in the course of their duties are permitted
access to it.
Restrict access to information stored on computer by using passwords, and change these passwords regularly.
Set up an audit trail system for computer systems to identify people who have gained access to information in order to facilitate future investigations and the monitoring of access control.