A-Z Popular Blog Security Search »
Information Security
 Advertisements
Related Guides

What is Need To Know?

 , updated on
Need to know is the practice of defending extremely sensitive secrets by restricting access to those who require the information in their work. According to need to know restrictions, those who have the authority to access information aren't allowed to access it unless they can demonstrate a valid purpose.

Mergers & Acquisitions

Two firms engaged in merger talks typically keep the information need to know. For example, they may hold offsite meetings that only involve the absolute minimum of executives, subject matter experts and financial advisors who are required.

Trade Secrets

Formulas, designs and techniques that a firm views as valuable trade secrets may be deemed need to know.

Classified Information

Governments typically implement a system of rules, regulations and procedures for handling classified information that may include oversight bodies. Ideally, such information is eventually declassified and made available to the public to improve trust in the government.
Overview: Need To Know
Type
Definition
Restricting access to sensitive information to those who need it in their work.
Notes
Applying need to know involves a great deal of overhead. Opening as much knowledge as possible to employees stimulates organizational productivity and innovation.
For compliance reasons, corporate governance bodies and government regulators are typically considered need to know.
The leader of an organization always has a need to know.
Related Concepts
Next: Defense In Depth

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cryptography
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Degaussing
Digital Identity
Failure Of Imagination
Geofencing
Hardening
Honeypot
Incident Response
IoT Security
Key Stretching
Network Security
Non-repudiation
Nonce
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Sandbox
Secure Code Review
Security As A Service
Security Controls
Zero-day
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Privacy By Design

An overview of privacy by design.

Expectation Of Privacy

The definition of expectation of privacy.

Personally Identifiable Information

An overview of personally identifiable information.

Delete vs Wipe

The difference between deleting data and wiping it.

Data Risks

A definition of data risk with examples.

Personal Information

A definition of personal information with examples.

Data Subject

A definition of data subject with examples.

Machine Readable

The definition of machine readable with examples.

Delete

The definition of delete with examples.

Privacy Examples

The definition of privacy with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map