The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives
Data loss prevention processes and technologies are used to restrict ability to authorize and execute transmission, movement and removal of information
Encryption technologies or secured communication channels are used to protect transmission of data and other communications beyond connectivity access points
Encryption technologies and physical asset protections are used for removable media (such as USB drives and back-up tapes), as appropriate
Processes are in place to protect mobile devices (such as laptops, smart phones and tablets) that serve as information assets.