[{"name":"Challenges","path":"\/challenges\/","link":"","sub":[{"name":"Corporate fraud","path":"\/challenges\/corporate-fraud\/","link":"\/challenges\/corporate_fraud\/","sub":[{"name":"Countering corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/","sub":[{"name":"Countering corruption in an organization","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-an-organization\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-an-organization\/","sub":[]},{"name":"Countering corruption in procurement","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-procurement\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-procurement\/","sub":[]},{"name":"Countering corruption in the civil service system","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/","sub":[{"name":"Countering corruption in armed forces","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-armed-forces\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-armed-forces\/","sub":[]},{"name":"Countering corruption in education","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-education\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-education\/","sub":[]},{"name":"Countering corruption in government bodies","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-government-bodies\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-government-bodies\/","sub":[]},{"name":"Countering corruption in health care","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-health-care\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-health-care\/","sub":[]},{"name":"Countering corruption in internal affairs bodies","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-internal-affairs-bodies\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-internal-affairs-bodies\/","sub":[]},{"name":"Countering corruption in judicial system","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-judicial-system\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-judicial-system\/","sub":[]},{"name":"Countering corruption in municipal institutions","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-municipal-institutions\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-municipal-institutions\/","sub":[]},{"name":"Countering corruption in preschool educational institutions","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-preschool-educational-institutions\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-preschool-educational-institutions\/","sub":[]},{"name":"Countering corruption in tax authorities","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-tax-authorities\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-tax-authorities\/","sub":[]}]},{"name":"Countering corruption in the private sector","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-private-sector\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-private-sector\/","sub":[{"name":"Countering corruption and fraud in a company","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-private-sector\/countering-corruption-and-fraud-in-a-company\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-private-sector\/countering-corruption-and-fraud-in-a-company\/","sub":[]}]},{"name":"Legal and institutional framework for countering corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/","sub":[{"name":"Actual problems of counteraction of corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/actual-problems-of-counteraction-of-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/actual-problems-of-counteraction-of-corruption\/","sub":[]},{"name":"Anti-corruption measures","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/anti-corruption-measures\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/anti-corruption-measures\/","sub":[]},{"name":"Anti-corruption plan","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/anti-corruption-plan\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/anti-corruption-plan\/","sub":[]},{"name":"Basic principles of countering corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/basic-principles-of-countering-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/basic-principles-of-countering-corruption\/","sub":[]},{"name":"Decree of the Government of the Russian Federation on Counteraction of Corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/decree-of-the-government-of-the-russian-federation-on-counteraction-of-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/decree-of-the-government-of-the-russian-federation-on-counteraction-of-corruption\/","sub":[]},{"name":"Foreign experience in countering corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/foreign-experience-in-countering-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/foreign-experience-in-countering-corruption\/","sub":[]},{"name":"Infringements in the field of counteraction of corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/infringements-in-the-field-of-counteraction-of-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/infringements-in-the-field-of-counteraction-of-corruption\/","sub":[]},{"name":"International anti-corruption standards","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/international-anti-corruption-standards\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/international-anti-corruption-standards\/","sub":[]},{"name":"Legal mechanisms of counteraction of corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/legal-mechanisms-of-counteraction-of-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/legal-mechanisms-of-counteraction-of-corruption\/","sub":[]},{"name":"National Anti-Corruption Strategy","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/national-anti-corruption-strategy\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/national-anti-corruption-strategy\/","sub":[]},{"name":"State policy in the field of anti-corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/state-policy-in-the-field-of-anti-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/state-policy-in-the-field-of-anti-corruption\/","sub":[]},{"name":"The main directions of countering corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/the-main-directions-of-countering-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/the-main-directions-of-countering-corruption\/","sub":[]}]}]},{"name":"Fraud prevention","path":"\/challenges\/corporate-fraud\/fraud-prevention\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/","sub":[{"name":"Corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/","link":"","sub":[{"name":"Classification of corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/classification-of-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/classification-of-corporate-fraud\/","sub":[]},{"name":"Countering corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/","sub":[{"name":"Corporate anti-fraud guidelines","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/corporate-anti-fraud-guidelines\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/corporate-anti-fraud-guidelines\/","sub":[]},{"name":"Corporate anti-fraud policy","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/corporate-anti-fraud-policy\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/corporate-anti-fraud-policy\/","sub":[]},{"name":"Methods of countering corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/methods-of-countering-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/methods-of-countering-corporate-fraud\/","sub":[]},{"name":"Ways to prevent corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/ways-to-prevent-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/ways-to-prevent-corporate-fraud\/","sub":[]}]},{"name":"Investigation of corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/investigation-of-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/investigation-of-corporate-fraud\/","sub":[]},{"name":"Signs of corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/signs-of-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/signs-of-corporate-fraud\/","sub":[]}]},{"name":"Economic fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/economic-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/economic-fraud\/","sub":[{"name":"Identification of fraud committed in the field of economics","path":"\/challenges\/corporate-fraud\/fraud-prevention\/economic-fraud\/identification-of-fraud-committed-in-the-field-of-economics\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/economic-fraud\/identification-of-fraud-committed-in-the-field-of-economics\/","sub":[]}]},{"name":"Financial fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/financial-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/financial-fraud\/","sub":[{"name":"Types of financial fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/financial-fraud\/types-of-financial-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/financial-fraud\/types-of-financial-fraud\/","sub":[]}]},{"name":"Fraud in the field of computer information","path":"\/challenges\/corporate-fraud\/fraud-prevention\/fraud-in-the-field-of-computer-information\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/fraud-in-the-field-of-computer-information\/","sub":[{"name":"Types of Internet fraud and how to deal with them","path":"\/challenges\/corporate-fraud\/fraud-prevention\/fraud-in-the-field-of-computer-information\/types-of-internet-fraud-and-how-to-deal-with-them\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/fraud-in-the-field-of-computer-information\/types-of-internet-fraud-and-how-to-deal-with-them\/","sub":[]}]},{"name":"Information reliability control","path":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/","sub":[{"name":"Digital fingerprinting","path":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/digital-fingerprinting\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/digital-fingerprinting\/","sub":[]},{"name":"Email spoofing","path":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/email-spoofing\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/email-spoofing\/","sub":[]},{"name":"Image authenticity verification","path":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/image-authenticity-verification\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/image-authenticity-verification\/","sub":[]}]},{"name":"Insurance fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/","sub":[{"name":"Fraud in an insurance organization","path":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/fraud-in-an-insurance-organization\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/fraud-in-an-insurance-organization\/","sub":[]},{"name":"Insurance fraud detection methods","path":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/insurance-fraud-detection-methods\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/insurance-fraud-detection-methods\/","sub":[]},{"name":"Insurance fraud prevention measures","path":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/insurance-fraud-prevention-measures\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/insurance-fraud-prevention-measures\/","sub":[]}]},{"name":"The difference between fraud and embezzlement and waste","path":"\/challenges\/corporate-fraud\/fraud-prevention\/the-difference-between-fraud-and-embezzlement-and-waste\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/the-difference-between-fraud-and-embezzlement-and-waste\/","sub":[]},{"name":"Types of financial fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/","sub":[{"name":"False financial reporting, errors and fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/false-financial-reporting,-errors-and-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/false-financial-reporting,-errors-and-fraud\/","sub":[]},{"name":"Financial reporting fraud detection methods","path":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/false-financial-reporting,-errors-and-fraud-financial-reporting-fraud-detection-methods\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/false-financial-reporting,-errors-and-fraud-financial-reporting-fraud-detection-methods\/","sub":[]},{"name":"Financial fraud on the Internet","path":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/financial-fraud-on-the-internet\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/financial-fraud-on-the-internet\/","sub":[]}]}]},{"name":"Identification of kickbacks","path":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/","link":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/","sub":[{"name":"How to identify kickbacks in procurement","path":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/how-to-identify-kickbacks-in-procurement\/","link":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/how-to-identify-kickbacks-in-procurement\/","sub":[]},{"name":"How to identify kickbacks in sales","path":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/how-to-identify-kickbacks-in-sales\/","link":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/how-to-identify-kickbacks-in-sales\/","sub":[]}]},{"name":"Insider identification","path":"\/challenges\/corporate-fraud\/insider-identification\/","link":"\/challenges\/corporate-fraud\/insider-identification\/","sub":[{"name":"Insiders in banks","path":"\/challenges\/corporate-fraud\/insider-identification\/insiders-in-banks\/","link":"\/challenges\/corporate-fraud\/insider-identification\/insiders-in-banks\/","sub":[]},{"name":"Insider trading","path":"\/challenges\/corporate-fraud\/insider-identification\/insider-trading\/","link":"\/challenges\/corporate-fraud\/insider-identification\/insider-trading\/","sub":[]}]}]},{"name":"Data loss prevention","path":"\/challenges\/data-loss-prevention\/","link":"","sub":[{"name":"How a DLP system works","path":"\/challenges\/data-loss-prevention\/how-a-dlp-system-works\/","link":"\/challenges\/data-loss-prevention\/how-a-dlp-system-works\/","sub":[]},{"name":"How to choose a DLP system","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/","sub":[{"name":"Comparison of DLP systems","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/comparison-of-dlp-systems\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/comparison-of-dlp-systems\/","sub":[]},{"name":"DLP for small businesses","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-for-small-businesses\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-for-small-businesses\/","sub":[]},{"name":"DLP system requirements","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-system-requirements\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-system-requirements\/","sub":[]},{"name":"DLP systems market analysis","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-systems-market-analysis\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-systems-market-analysis\/","sub":[]},{"name":"DLP systems test","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-systems-test\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-systems-test\/","sub":[]},{"name":"Terms of reference for the purchase of a DLP system","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/terms-of-reference-for-the-purchase-of-a-dlp-system\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/terms-of-reference-for-the-purchase-of-a-dlp-system\/","sub":[]}]},{"name":"Implementation of DLP systems","path":"\/challenges\/data-loss-prevention\/implementation-of-dlp-systems\/","link":"\/challenges\/data-loss-prevention\/implementation-of-dlp-systems\/","sub":[{"name":"Development of terms of reference for the implementation of a DLP system","path":"\/challenges\/data-loss-prevention\/implementation-of-dlp-systems\/development-of-terms-of-reference-for-the-implementation-of-a-dlp-system\/","link":"\/challenges\/data-loss-prevention\/implementation-of-dlp-systems\/development-of-terms-of-reference-for-the-implementation-of-a-dlp-system\/","sub":[]}]},{"name":"Information security incident management","path":"\/challenges\/data-loss-prevention\/information-security-incident-management\/","link":"\/challenges\/data-loss-prevention\/information-security-incident-management\/","sub":[]},{"name":"Configuring DLP","path":"\/challenges\/data-loss-prevention\/configuring-dlp\/","link":"\/challenges\/data-loss-prevention\/configuring-dlp\/","sub":[]},{"name":"DLP systems cost","path":"\/challenges\/data-loss-prevention\/dlp-systems-cost\/","link":"\/challenges\/data-loss-prevention\/dlp-systems-cost\/","sub":[]}]},{"name":"Information security","path":"\/challenges\/information-security\/","link":"","sub":[{"name":"Information security analytics","path":"\/challenges\/information-security\/information-security-analytics\/","link":"\/challenges\/information-security\/information-security-analytics\/","sub":[{"name":"Information leaks","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/","sub":[{"name":"Information leakage cases","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/","sub":[{"name":"Consequences of information leakage","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/consequences-of-information-leakage\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/consequences-of-information-leakage\/","sub":[]},{"name":"Damage from information leakage","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/damage-from-information-leakage\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/damage-from-information-leakage\/","sub":[]},{"name":"Information leakage cases in healthcare","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/information-leakage-cases-in-healthcare\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/information-leakage-cases-in-healthcare\/","sub":[]}]},{"name":"Information leakage causes","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/","sub":[{"name":"Main channels of information leakage","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/main-channels-of-information-leakage\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/main-channels-of-information-leakage\/","sub":[]},{"name":"Reasons and conditions for leakage of protected information","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/reasons-and-conditions-for-leakage-of-protected-information\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/reasons-and-conditions-for-leakage-of-protected-information\/","sub":[]},{"name":"Reasons for information leakage at an enterprise","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/reasons-for-information-leakage-at-an-enterprise\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/reasons-for-information-leakage-at-an-enterprise\/","sub":[]},{"name":"Sources of information leaks","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/sources-of-information-leaks\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/sources-of-information-leaks\/","sub":[]}]},{"name":"Methods of prevention of information leakage","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/","sub":[{"name":"Countering information leaks","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/countering-information-leaks\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/countering-information-leaks\/","sub":[]},{"name":"How to avoid information leakage","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/how-to-avoid-information-leakage\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/how-to-avoid-information-leakage\/","sub":[]},{"name":"Information leak investigation","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/information-leak-investigation\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/information-leak-investigation\/","sub":[]},{"name":"Types of information leakage threats","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/types-of-information-leakage-threats\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/types-of-information-leakage-threats\/","sub":[]}]}]},{"name":"Methods of ensuring information security","path":"\/challenges\/information-security\/information-security-analytics\/research-in-the-field-of-information-security\/methods-of-ensuring-information-security\/","link":"\/challenges\/information-security\/information-security-analytics\/research-in-the-field-of-information-security\/methods-of-ensuring-information-security\/","sub":[]}]},{"name":"Information security basics","path":"\/challenges\/information-security\/information-security-basics\/","link":"\/challenges\/information-security\/information-security-basics\/","sub":[{"name":"Information security documents","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/","sub":[{"name":"Bank information security documents","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/bank-information-security-documents\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/bank-information-security-documents\/","sub":[]},{"name":"Information security document templates","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-document-templates\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-document-templates\/","sub":[]},{"name":"Information security instructions","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/","sub":[{"name":"Information security administrator instructions","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-administrator-instructions\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-administrator-instructions\/","sub":[]},{"name":"Information security briefing log","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-briefing-log\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-briefing-log\/","sub":[]},{"name":"Information security department regulations","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-department-regulations\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-department-regulations\/","sub":[]},{"name":"Information security engineer job description","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-engineer-job-description\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-engineer-job-description\/","sub":[]},{"name":"Information security specialist job description","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-engineer-job-description\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-engineer-job-description\/","sub":[]},{"name":"Information security service","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-service\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-service\/","sub":[]},{"name":"Regulations on information security service","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/regulations-on-information-security-service\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/regulations-on-information-security-service\/","sub":[]}]},{"name":"Information security regulations","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-regulations\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-regulations\/","sub":[]},{"name":"List of documents on information security in an organization","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/list-of-documents-on-information-security-in-an-organization\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/list-of-documents-on-information-security-in-an-organization\/","sub":[]},{"name":"Information security documents","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/the-basic-principles-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/the-basic-principles-of-information-security\/","sub":[]}]},{"name":"Information security in industries","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/","sub":[{"name":"Business information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/business-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/business-information-security\/","sub":[]},{"name":"Corporate information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/","sub":[{"name":"Enterprise corporate security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/enterprise-corporate-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/enterprise-corporate-security\/","sub":[]},{"name":"Information security in a corporation","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/information-security-in-a-corporation\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/information-security-in-a-corporation\/","sub":[]}]},{"name":"Information security in manufacturing","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-in-manufacturing\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-in-manufacturing\/","sub":[]},{"name":"Information security of databases","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-databases\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-databases\/","sub":[]},{"name":"Information security of document flow","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-document-flow\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-document-flow\/","sub":[]},{"name":"Information security of economic activity","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-economic-activity\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-economic-activity\/","sub":[]},{"name":"Information security of enterprises","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/","sub":[{"name":"Enterprise information security, where to start","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/enterprise-information-security,-where-to-start\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/enterprise-information-security,-where-to-start\/","sub":[]},{"name":"Examples of enterprise information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/examples-of-enterprise-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/examples-of-enterprise-information-security\/","sub":[]},{"name":"Information security of industrial enterprises","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/information-security-of-industrial-enterprises\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/information-security-of-industrial-enterprises\/","sub":[]},{"name":"Information security rules at an enterprise","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/information-security-rules-at-an-enterprise\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/information-security-rules-at-an-enterprise\/","sub":[]},{"name":"Internal security of an enterprise","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/internal-security-of-an-enterprise\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/internal-security-of-an-enterprise\/","sub":[]},{"name":"Technical support of information security of an enterprise","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/technical-support-of-information-security-of-an-enterprise\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/technical-support-of-information-security-of-an-enterprise\/","sub":[]}]},{"name":"Information systems security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/","sub":[{"name":"Complex systems of information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/complex-systems-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/complex-systems-of-information-security\/","sub":[]},{"name":"Ensuring banking system information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/ensuring-banking-system-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/ensuring-banking-system-information-security\/","sub":[]},{"name":"Information security in financial systems","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-in-financial-systems\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-in-financial-systems\/","sub":[]},{"name":"Information security in the national security system","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-in-the-national-security-system\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-in-the-national-security-system\/","sub":[]},{"name":"Information security of automated systems (ACS)","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-automated-systems-(acs)\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-automated-systems-(acs)\/","sub":[]},{"name":"Information security of computer systems and networks","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-computer-systems-and-networks\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-computer-systems-and-networks\/","sub":[]},{"name":"Information security of electronic payment systems","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-electronic-payment-systems\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-electronic-payment-systems\/","sub":[]},{"name":"Information security of telecommunication systems","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-telecommunication-systems\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-telecommunication-systems\/","sub":[]},{"name":"Information security systems development","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-systems-development\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-systems-development\/","sub":[]},{"name":"Information systems security architecture","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-architecture\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-architecture\/","sub":[]},{"name":"Information systems security classes","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-classes\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-classes\/","sub":[]},{"name":"Information systems security mechanisms","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-mechanisms\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-mechanisms\/","sub":[]}]},{"name":"Information technology security in law enforcement","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-technology-security-in-law-enforcement\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-technology-security-in-law-enforcement\/","sub":[{"name":"Ensuring information security of the FSB of the Russian Federation","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-technology-security-in-law-enforcement\/ensuring-information-security-of-the-fsb-of-the-russian-federation\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-technology-security-in-law-enforcement\/ensuring-information-security-of-the-fsb-of-the-russian-federation\/","sub":[]}]},{"name":"Office information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/office-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/office-information-security\/","sub":[]}]},{"name":"Information security in Russia and the world","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-russia-and-the-world\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-russia-and-the-world\/","sub":[{"name":"Fundamentals of national information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-russia-and-the-world\/fundamentals-of-national-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-russia-and-the-world\/fundamentals-of-national-information-security\/","sub":[]}]},{"name":"Information security threats","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/","sub":[{"name":"Factors creating a threat to information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/factors-creating-a-threat-to-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/factors-creating-a-threat-to-information-security\/","sub":[]},{"name":"Information security threat analysis","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/information-security-threat-analysis\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/information-security-threat-analysis\/","sub":[]},{"name":"The main types of information security threats","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/","sub":[{"name":"External threats to information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/external-threats-to-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/external-threats-to-information-security\/","sub":[]},{"name":"Intentional threats to information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/intentional-threats-to-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/intentional-threats-to-information-security\/","sub":[]},{"name":"Internal information security threats","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/internal-information-security-threats\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/internal-information-security-threats\/","sub":[]},{"name":"Potential threats to information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/potential-threats-to-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/potential-threats-to-information-security\/","sub":[]},{"name":"Unintentional threats to information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/unintentional-threats-to-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/unintentional-threats-to-information-security\/","sub":[]}]}]},{"name":"Key aspects of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/","sub":[{"name":"Basic concepts of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/basic-concepts-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/basic-concepts-of-information-security\/","sub":[]},{"name":"Basics of computer security, information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/basics-of-computer-security,-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/basics-of-computer-security,-information-security\/","sub":[]},{"name":"Fields of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/fields-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/fields-of-information-security\/","sub":[]},{"name":"Foundations of national security information","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/foundations-of-national-security-information\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/foundations-of-national-security-information\/","sub":[]},{"name":"Goals and objectives of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/goals-and-objectives-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/goals-and-objectives-of-information-security\/","sub":[]},{"name":"Information security doctrine","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/","sub":[{"name":"Comparison of information security doctrines","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/comparison-of-information-security-doctrines\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/comparison-of-information-security-doctrines\/","sub":[]},{"name":"New doctrine of information security of the Russian Federation","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/new-doctrine-of-information-security-of-the-russian-federation\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/new-doctrine-of-information-security-of-the-russian-federation\/","sub":[]},{"name":"State doctrine of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/state-doctrine-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/state-doctrine-of-information-security\/","sub":[]},{"name":"The main provisions of the doctrine of information security of the Russian Federation","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/the-main-provisions-of-the-doctrine-of-information-security-of-the-russian-federation\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/the-main-provisions-of-the-doctrine-of-information-security-of-the-russian-federation\/","sub":[]},{"name":"The strategic goal of the information security doctrine of the Russian Federation","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/the-strategic-goal-of-the-information-security-doctrine-of-the-russian-federation\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/the-strategic-goal-of-the-information-security-doctrine-of-the-russian-federation\/","sub":[]}]},{"name":"Information security requirements","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-requirements\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-requirements\/","sub":[]},{"name":"Information security terms","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-terms\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-terms\/","sub":[]},{"name":"Properties of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/properties-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/properties-of-information-security\/","sub":[]},{"name":"Regulation on information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/regulation-on-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/regulation-on-information-security\/","sub":[]},{"name":"The basic principles of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/","sub":[{"name":"Basic software and hardware measures to ensure information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/basic-software-and-hardware-measures-to-ensure-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/basic-software-and-hardware-measures-to-ensure-information-security\/","sub":[]},{"name":"Information security levels","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-levels\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-levels\/","sub":[]},{"name":"Information security management","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-management\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-management\/","sub":[]},{"name":"Information security measures","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-measures\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-measures\/","sub":[]},{"name":"Information security methods","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-methods\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-methods\/","sub":[]},{"name":"Information security problems","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-problems\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-problems\/","sub":[]},{"name":"Information security systems","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-systems\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-systems\/","sub":[]},{"name":"Information security tools","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-tools\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-tools\/","sub":[]},{"name":"Regulations for ensuring information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/regulations-for-ensuring-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/regulations-for-ensuring-information-security\/","sub":[]}]},{"name":"The main components of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-main-components-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-main-components-of-information-security\/","sub":[]},{"name":"The main objects of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-main-objects-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-main-objects-of-information-security\/","sub":[]}]},{"name":"Profiling","path":"\/challenges\/information-security\/information-security-basics\/profiling\/","link":"\/challenges\/information-security\/information-security-basics\/profiling\/","sub":[]}]},{"name":"Protection of information","path":"\/challenges\/information-security\/protection-of-information\/","link":"","sub":[{"name":"Protection of information","path":"\/challenges\/information-security\/protection-of-information\/information-security-in-russia-and-the-world\/","link":"\/challenges\/information-security\/protection-of-information\/information-security-in-russia-and-the-world\/","sub":[]},{"name":"Methods of information protection","path":"\/challenges\/information-security\/protection-of-information\/methods-of-information-protection\/","link":"\/challenges\/information-security\/protection-of-information\/methods-of-information-protection\/","sub":[]},{"name":"Protecting information on a USB flash drive","path":"\/challenges\/information-security\/protection-of-information\/protecting-information-on-a-usb-flash-drive\/","link":"\/challenges\/information-security\/protection-of-information\/protecting-information-on-a-usb-flash-drive\/","sub":[]},{"name":"Protection against data leaks","path":"\/challenges\/information-security\/protection-of-information\/protection-against-data-leaks\/","link":"\/challenges\/information-security\/protection-of-information\/protection-against-data-leaks\/","sub":[]},{"name":"Protection of information constituting a commercial secret","path":"\/challenges\/information-security\/protection-of-information\/protection-of-information-constituting-a-commercial-secret\/","link":"\/challenges\/information-security\/protection-of-information\/protection-of-information-constituting-a-commercial-secret\/","sub":[]}]}]},{"name":"Personal data protection","path":"\/challenges\/personal-data-protection\/","link":"","sub":[{"name":"Protection of personal information","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/","sub":[{"name":"Categories of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/categories-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/categories-of-personal-data\/","sub":[]},{"name":"Classification of personal data information systems","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/classification-of-personal-data-information-systems\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/classification-of-personal-data-information-systems\/","sub":[]},{"name":"Deletion of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/deletion-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/deletion-of-personal-data\/","sub":[]},{"name":"Emailing personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/emailing-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/emailing-personal-data\/","sub":[]},{"name":"Employee personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/employee-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/employee-personal-data\/","sub":[]},{"name":"Implementation of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/","sub":[{"name":"Assessment of the effectiveness of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/assessment-of-the-effectiveness-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/assessment-of-the-effectiveness-of-personal-data-protection\/","sub":[]},{"name":"Classes of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/classes-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/classes-of-personal-data-protection\/","sub":[]},{"name":"Constitution of the Russian Federation on personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/constitution-of-the-russian-federation-on-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/constitution-of-the-russian-federation-on-personal-data-protection\/","sub":[]},{"name":"Features of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/features-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/features-of-personal-data-protection\/","sub":[]},{"name":"FSTEC recommendations on personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/fstec-recommendations-on-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/fstec-recommendations-on-personal-data-protection\/","sub":[]},{"name":"History of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/history-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/history-of-personal-data-protection\/","sub":[]},{"name":"International personal data protection system","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/","sub":[{"name":"Personal data protection in Belarus","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-belarus\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-belarus\/","sub":[]},{"name":"Personal data protection in the Russian Federation","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-the-russian-federation\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-the-russian-federation\/","sub":[]},{"name":"Personal data protection in the US","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-the-us\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-the-us\/","sub":[]}]},{"name":"Judicial practice on personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/judicial-practice-on-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/judicial-practice-on-personal-data-protection\/","sub":[]},{"name":"Legal protection of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/legal-protection-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/legal-protection-of-personal-data\/","sub":[]},{"name":"List of documents on personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-documents-on-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-documents-on-personal-data-protection\/","sub":[]},{"name":"List of personal data to be protected","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/","sub":[{"name":"Children's personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/childrens-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/childrens-personal-data-protection\/","sub":[]},{"name":"Cloud personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/cloud-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/cloud-personal-data-protection\/","sub":[]},{"name":"Employee personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/employee-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/employee-personal-data-protection\/","sub":[]},{"name":"Personal data protection at an enterprise","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-at-an-enterprise\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-at-an-enterprise\/","sub":[]},{"name":"Personal data protection in a DMS","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-dms\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-dms\/","sub":[]},{"name":"Personal data protection in a HOA","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-hoa\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-hoa\/","sub":[]},{"name":"Personal data protection in a hotel","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-hotel\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-hotel\/","sub":[]},{"name":"Personal data protection in banks","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-banks\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-banks\/","sub":[]},{"name":"Personal data protection in educational institutions","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-educational-institutions\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-educational-institutions\/","sub":[]},{"name":"Personal data protection in medical institutions","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-medical-institutions\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-medical-institutions\/","sub":[]},{"name":"Personal data protection in preschool educational institutions","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-preschool-educational-institutions\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-preschool-educational-institutions\/","sub":[]},{"name":"Personal data protection of clients of an organization","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-of-clients-of-an-organization\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-of-clients-of-an-organization\/","sub":[]},{"name":"Personal data protection on a personal computer","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-on-a-personal-computer\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-on-a-personal-computer\/","sub":[]},{"name":"Personal data protection on the Internet","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-on-the-internet\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-on-the-internet\/","sub":[]}]},{"name":"Measures to ensure personal data protection in an organization","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/measures-to-ensure-personal-data-protection-in-an-organization\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/measures-to-ensure-personal-data-protection-in-an-organization\/","sub":[]},{"name":"Organization policy in the field of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/organization-policy-in-the-field-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/organization-policy-in-the-field-of-personal-data-protection\/","sub":[]},{"name":"Personal data protection action plan","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-action-plan\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-action-plan\/","sub":[]},{"name":"Personal data protection issues","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-issues\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-issues\/","sub":[]},{"name":"Personal data protection mode","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-mode\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-mode\/","sub":[]},{"name":"Personal data protection services","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-services\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-services\/","sub":[]},{"name":"Personal data protection system certification","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-system-certification\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-system-certification\/","sub":[]},{"name":"Personal data protection systems","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-systems\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-systems\/","sub":[]},{"name":"Personal data security means","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-security-means\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-security-means\/","sub":[]},{"name":"Personal data security requirements","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-security-requirements\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-security-requirements\/","sub":[]},{"name":"Regulatory framework for personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/regulatory-framework-for-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/regulatory-framework-for-personal-data-protection\/","sub":[]},{"name":"Requirements for personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/requirements-for-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/requirements-for-personal-data-protection\/","sub":[]},{"name":"Technical protection of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/technical-protection-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/technical-protection-of-personal-data\/","sub":[]},{"name":"Who controls personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/who-controls-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/who-controls-personal-data-protection\/","sub":[]}]},{"name":"Personal data leaks","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-leaks\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-leaks\/","sub":[{"name":"Implications of personal data leaks","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-leaks\/implications-of-personal-data-leaks\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-leaks\/implications-of-personal-data-leaks\/","sub":[]}]},{"name":"Personal data processing","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/","sub":[{"name":"Legal basis for personal data processing","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/legal-basis-for-personal-data-processing\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/legal-basis-for-personal-data-processing\/","sub":[]},{"name":"Personal data processing in a bank","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-in-a-bank\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-in-a-bank\/","sub":[]},{"name":"Personal data processing methods","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-methods\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-methods\/","sub":[]},{"name":"Personal data processing of a legal entity","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-of-a-legal-entity\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-of-a-legal-entity\/","sub":[]},{"name":"Personal data processing policy","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-policy\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-policy\/","sub":[]},{"name":"Purpose of personal data processing","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/purpose-of-personal-data-processing\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/purpose-of-personal-data-processing\/","sub":[]}]},{"name":"Personal data subject","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/","sub":[{"name":"Personal data of civil servants","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-civil-servants\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-civil-servants\/","sub":[]},{"name":"Personal data of housing and communal services","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-housing-and-communal-services\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-housing-and-communal-services\/","sub":[]},{"name":"Personal data of minors","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-minors\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-minors\/","sub":[]},{"name":"Personal data of police officers","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-police-officers\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-police-officers\/","sub":[]}]},{"name":"Sale of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/sale-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/sale-of-personal-data\/","sub":[]},{"name":"Storage of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/","sub":[{"name":"Regulations on employee personal data storage","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/regulations-on-employee-personal-data-storage\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/regulations-on-employee-personal-data-storage\/","sub":[]},{"name":"Regulations on the procedure for storing employee personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/regulations-on-the-procedure-for-storing-employee-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/regulations-on-the-procedure-for-storing-employee-personal-data\/","sub":[]},{"name":"Storage retention period of employee personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/storage-retention-period-of-employee-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/storage-retention-period-of-employee-personal-data\/","sub":[]},{"name":"The procedure for storing and using employee personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/the-procedure-for-storing-and-using-employee-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/the-procedure-for-storing-and-using-employee-personal-data\/","sub":[]},{"name":"Where is personal data stored","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/where-is-personal-data-stored\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/where-is-personal-data-stored\/","sub":[]}]},{"name":"Transfer of personal data to third parties","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/transfer-of-personal-data-to-third-parties\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/transfer-of-personal-data-to-third-parties\/","sub":[]},{"name":"Types of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/types-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/types-of-personal-data\/","sub":[]},{"name":"Use of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/use-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/use-of-personal-data\/","sub":[]},{"name":"What personal data is publicly available","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/","sub":[{"name":"Is full name personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-full-name-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-full-name-personal-data\/","sub":[]},{"name":"Is phone number personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-phone-number-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-phone-number-personal-data\/","sub":[]},{"name":"Is photo personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-photo-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-photo-personal-data\/","sub":[]}]}]}]},{"name":"Employee control","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/","sub":[{"name":"Assessment of staff in an organization","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/","sub":[{"name":"Assessment of staff efficiency","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/assessment-of-staff-efficiency\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/assessment-of-staff-efficiency\/","sub":[]},{"name":"Automated staff assessment system","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/automated-staff-assessment-system\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/automated-staff-assessment-system\/","sub":[]},{"name":"Improving working time efficiency","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/improving-working-time-efficiency\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/improving-working-time-efficiency\/","sub":[]},{"name":"Staff assessment methods in an organization","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/staff-assessment-methods-in-an-organization\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/staff-assessment-methods-in-an-organization\/","sub":[]}]},{"name":"Staff motivation","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/","sub":[{"name":"Foreign experience in staff motivation","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/foreign-experience-in-staff-motivation\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/foreign-experience-in-staff-motivation\/","sub":[]},{"name":"Modern approaches to staff motivation","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/modern-approaches-to-staff-motivation\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/modern-approaches-to-staff-motivation\/","sub":[]},{"name":"Non-standard methods of staff motivation","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/non-standard-methods-of-staff-motivation\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/non-standard-methods-of-staff-motivation\/","sub":[]},{"name":"Staff motivation methods","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/staff-motivation-methods\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/staff-motivation-methods\/","sub":[]},{"name":"Theory and practice of staff motivation","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/theory-and-practice-of-staff-motivation\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/theory-and-practice-of-staff-motivation\/","sub":[]}]},{"name":"Time tracking","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/","sub":[{"name":"Automated employee time tracking","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/automated-employee-time-tracking\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/automated-employee-time-tracking\/","sub":[]},{"name":"Methods of time tracking","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/methods-of-time-tracking\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/methods-of-time-tracking\/","sub":[]},{"name":"Specificities of time tracking","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/specificities-of-time-tracking\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/specificities-of-time-tracking\/","sub":[]},{"name":"Time tracking of remote employees","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/time-tracking-of-remote-employees\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/time-tracking-of-remote-employees\/","sub":[]}]}]}]},{"name":"Industries","path":"\/industries\/","link":"","sub":[{"name":"Business services","path":"\/industries\/business-services\/","link":"\/industries\/business_services\/","sub":[{"name":"Competitive intelligence","path":"\/industries\/business-services\/competitive-intelligence\/","link":"\/industries\/business-services\/competitive-intelligence\/","sub":[{"name":"Competitive intelligence and industrial espionage comparative analysis","path":"\/industries\/business-services\/competitive-intelligence\/competitive-intelligence-and-industrial-espionage-comparative-analysis\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-intelligence-and-industrial-espionage-comparative-analysis\/","sub":[]},{"name":"Competitive wars","path":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/","sub":[{"name":"Competitive intelligence in an enterprise","path":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-in-an-enterprise\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-in-an-enterprise\/","sub":[]},{"name":"Competitive Intelligence on the Internet","path":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-on-the-internet\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-on-the-internet\/","sub":[]},{"name":"Competitive intelligence techniques","path":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-techniques\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-techniques\/","sub":[]},{"name":"Competitive intelligence methods abroad","path":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-techniques\/competitive-intelligence-methods-abroad\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-techniques\/competitive-intelligence-methods-abroad\/","sub":[]}]},{"name":"Industrial espionage","path":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/","link":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/","sub":[{"name":"Examples of industrial espionage","path":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/examples-of-industrial-espionage\/","link":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/examples-of-industrial-espionage\/","sub":[]},{"name":"Risks related to industrial espionage","path":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/risks-related-to-industrial-espionage\/","link":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/risks-related-to-industrial-espionage\/","sub":[]},{"name":"Who can be the subject of industrial espionage","path":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/who-can-be-the-subject-of-industrial-espionage\/","link":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/who-can-be-the-subject-of-industrial-espionage\/","sub":[]}]}]},{"name":"Trade secret protection","path":"\/industries\/business-services\/trade-secret-protection\/","link":"\/industries\/business-services\/trade-secret-protection\/","sub":[{"name":"Commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/","sub":[{"name":"Commercial bribery extortion","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-extortion\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-extortion\/","sub":[]},{"name":"Commercial bribery of foreign persons","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-of-foreign-persons\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-of-foreign-persons\/","sub":[]},{"name":"Commercial bribery statistics","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-statistics\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-statistics\/","sub":[]},{"name":"Criminal law characteristics of commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/criminal-law-characteristics-of-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/criminal-law-characteristics-of-commercial-bribery\/","sub":[]},{"name":"Criminal liability for commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/criminal-liability-for-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/criminal-liability-for-commercial-bribery\/","sub":[]},{"name":"History of the crime of commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/history-of-the-crime-of-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/history-of-the-crime-of-commercial-bribery\/","sub":[]},{"name":"How to prove commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/how-to-prove-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/how-to-prove-commercial-bribery\/","sub":[]},{"name":"Intermediation in commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/intermediation-in-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/intermediation-in-commercial-bribery\/","sub":[]},{"name":"Qualifying features of commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/qualifying-features-of-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/qualifying-features-of-commercial-bribery\/","sub":[]},{"name":"Small commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/small-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/small-commercial-bribery\/","sub":[]},{"name":"Subject of commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/subject-of-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/subject-of-commercial-bribery\/","sub":[]},{"name":"The difference between bribery and commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/the-difference-between-bribery-and-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/the-difference-between-bribery-and-commercial-bribery\/","sub":[]},{"name":"What is the danger of commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/what-is-the-danger-of-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/what-is-the-danger-of-commercial-bribery\/","sub":[]}]},{"name":"Disclosure of trade secrets","path":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/","link":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/","sub":[{"name":"Disclosure of trade secrets after dismissal of an employee","path":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/disclosure-of-trade-secrets-after-dismissal-of-an-employee\/","link":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/disclosure-of-trade-secrets-after-dismissal-of-an-employee\/","sub":[]},{"name":"Dismissal for disclosure of trade secrets","path":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/dismissal-for-disclosure-of-trade-secrets\/","link":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/dismissal-for-disclosure-of-trade-secrets\/","sub":[]}]}]},{"name":"Working with confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/","sub":[{"name":"Classification of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/classification-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/classification-of-confidential-information\/","sub":[]},{"name":"Confidential Information Law","path":"\/industries\/business-services\/working-with-confidential-information\/confidential-information-law\/","link":"\/industries\/business-services\/working-with-confidential-information\/confidential-information-law\/","sub":[]},{"name":"Disclosure of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/disclosure-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/disclosure-of-confidential-information\/","sub":[]},{"name":"FSTEC license for technical protection of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/fstec-license-for-technical-protection-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/fstec-license-for-technical-protection-of-confidential-information\/","sub":[]},{"name":"Legal regulation of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/legal-regulation-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/legal-regulation-of-confidential-information\/","sub":[]},{"name":"List of information constituting confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/list-of-information-constituting-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/list-of-information-constituting-confidential-information\/","sub":[]},{"name":"Measures to protect confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/measures-to-protect-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/measures-to-protect-confidential-information\/","sub":[]},{"name":"Methodology for assessing confidential information security","path":"\/industries\/business-services\/working-with-confidential-information\/methodology-for-assessing-confidential-information-security\/","link":"\/industries\/business-services\/working-with-confidential-information\/methodology-for-assessing-confidential-information-security\/","sub":[]},{"name":"Organization of protection of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/organization-of-protection-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/organization-of-protection-of-confidential-information\/","sub":[]},{"name":"Organization of storage of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/organization-of-storage-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/organization-of-storage-of-confidential-information\/","sub":[]},{"name":"Procedure for processing confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/procedure-for-processing-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/procedure-for-processing-confidential-information\/","sub":[]},{"name":"Regulations on protection of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/regulations-on-protection-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/regulations-on-protection-of-confidential-information\/","sub":[]},{"name":"Rules for handling confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/rules-for-handling-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/rules-for-handling-confidential-information\/","sub":[]},{"name":"Sale of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/sale-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/sale-of-confidential-information\/","sub":[]},{"name":"Theft of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/theft-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/theft-of-confidential-information\/","sub":[]},{"name":"Transfer of confidential information by email","path":"\/industries\/business-services\/working-with-confidential-information\/transfer-of-confidential-information-by-email\/","link":"\/industries\/business-services\/working-with-confidential-information\/transfer-of-confidential-information-by-email\/","sub":[]},{"name":"What information constitutes confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/what-information-constitutes-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/what-information-constitutes-confidential-information\/","sub":[]},{"name":"Working with confidential documents","path":"\/industries\/business-services\/working-with-confidential-information\/working-with-confidential-documents\/","link":"\/industries\/business-services\/working-with-confidential-information\/working-with-confidential-documents\/","sub":[]}]},{"name":"Countering terrorism","path":"\/industries\/business-services\/countering-terrorism\/","link":"\/industries\/business-services\/countering-terrorism\/","sub":[]}]},{"name":"Education","path":"\/industries\/education\/","link":"\/industries\/education\/","sub":[{"name":"Information security of educational institutions","path":"\/industries\/education\/information-security-of-educational-institutions\/","link":"\/industries\/education\/information-security-of-educational-institutions\/","sub":[]}]},{"name":"Financial services","path":"\/industries\/financial-services\/","link":"\/industries\/financial_services\/","sub":[{"name":"Bank information security","path":"\/industries\/financial-services\/bank-information-security\/","link":"\/industries\/financial-services\/bank-information-security\/","sub":[{"name":"Bank fraud","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/","sub":[{"name":"Anti-fraud system in the banking sector","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/anti-fraud-system-in-the-banking-sector\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/anti-fraud-system-in-the-banking-sector\/","sub":[]},{"name":"Bank information security threats","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/bank-information-security-threats\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/bank-information-security-threats\/","sub":[]},{"name":"Credit fraud investigation technique","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/credit-fraud\/credit-fraud-investigation-technique\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/credit-fraud\/credit-fraud-investigation-technique\/","sub":[]},{"name":"Types of bank fraud","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/","sub":[{"name":"Bank account fraud","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/bank-account-fraud\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/bank-account-fraud\/","sub":[]},{"name":"Bank card fraud","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/bank-card-fraud\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/bank-card-fraud\/","sub":[]},{"name":"Credit fraud","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/credit-fraud\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/credit-fraud\/","sub":[]},{"name":"Fraud when applying for a loan by a bank employee","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/fraud-when-applying-for-a-loan-by-a-bank-employee\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/fraud-when-applying-for-a-loan-by-a-bank-employee\/","sub":[]}]}]},{"name":"Violation of bank secrecy","path":"\/industries\/financial-services\/bank-information-security\/violation-of-bank-secrecy\/","link":"\/industries\/financial-services\/bank-information-security\/violation-of-bank-secrecy\/","sub":[{"name":"Consequences of disclosure of bank secrecy","path":"\/industries\/financial-services\/bank-information-security\/violation-of-bank-secrecy\/consequences-of-disclosure-of-bank-secrecy\/","link":"\/industries\/financial-services\/bank-information-security\/violation-of-bank-secrecy\/consequences-of-disclosure-of-bank-secrecy\/","sub":[]}]}]}]},{"name":"Government","path":"\/industries\/government\/","link":"\/industries\/government\/","sub":[{"name":"Information security of state institutions","path":"\/industries\/government\/information-security-of-state-institutions\/","link":"\/industries\/government\/information-security-of-state-institutions\/","sub":[]}]},{"name":"Healthcare","path":"\/industries\/healthcare\/","link":"\/industries\/healthcare\/","sub":[{"name":"Information security in healthcare","path":"\/industries\/healthcare\/information-security-in-healthcare\/","link":"\/industries\/healthcare\/information-security-in-healthcare\/","sub":[]}]},{"name":"Insurance","path":"\/industries\/insurance\/","link":"\/industries\/insurance\/","sub":[{"name":"Information security of insurance companies","path":"\/industries\/insurance\/information-security-of-insurance-companies\/","link":"\/industries\/insurance\/information-security-of-insurance-companies\/","sub":[]}]},{"name":"Technology","path":"\/industries\/technology\/","link":"\/industries\/technology\/","sub":[]},{"name":"Manufacturing","path":"\/industries\/manufacturing\/","link":"\/industries\/manufacturing\/","sub":[]},{"name":"Retail","path":"\/industries\/retail\/","link":"\/industries\/retail\/","sub":[]},{"name":"Energy","path":"\/industries\/energy\/","link":"\/industries\/energy\/","sub":[]},{"name":"Hospitality","path":"\/industries\/hospitality\/","link":"\/industries\/hospitality\/","sub":[]},{"name":"Construction","path":"\/industries\/construction\/","link":"\/industries\/construction\/","sub":[]}]}]
We use cookies to analyze our website usage, make our service more effective, and improve user experience. By continuing to use our website, you are agreeing to our policy.