A-Z Popular New Security Search »
Information Security
 
Related Guides

What is a Data Room?

 , updated on
A data room is a secured space that houses physical data or information. The purpose of a data room is to carefully control physical access to data to those who have authority to access it. They are used for information security in data centers and may also be used to reduce financial and legal risks by placing confidential documentation in a secured location.
Data rooms may have strict access procedures, physical security devices such as mantraps and policies or technologies that prevent communication or network access from the room. In some cases, mobile phones, cameras and recording devices are prohibited in a data room.
Overview: Data Room
Type
Definition
A physically secure location for data or information.
Examples
A secure room that is used for information sharing as part of a merger or acquisition process. Often located in the offices of a firm's legal or financial representatives.
A documentation room for a procurement process that provides confidential data to bidders.
A room in a data center that houses particularly secure storage infrastructure.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Data Security

A list of common data security techniques.

Data Remanence

An overview of data remanence.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Masking vs Redaction

The difference between data masking and redaction.

Degaussing

A definition of degaussing as a data security technique.

Data Control

A definition of data control with examples.

Data States

An overview of the three data states.

Personal Data

Examples of the common types of personal data.

Cybersecurity Risk

An overview of cybersecurity risk at the organizational level.

Confidential Information

An overview of confidential information with examples.

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map