[{"name":"Challenges","path":"\/challenges\/","link":"","sub":[{"name":"Corporate fraud","path":"\/challenges\/corporate-fraud\/","link":"\/challenges\/corporate_fraud\/","sub":[{"name":"Countering corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/","sub":[{"name":"Countering corruption in an organization","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-an-organization\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-an-organization\/","sub":[]},{"name":"Countering corruption in procurement","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-procurement\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-procurement\/","sub":[]},{"name":"Countering corruption in the civil service system","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/","sub":[{"name":"Countering corruption in armed forces","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-armed-forces\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-armed-forces\/","sub":[]},{"name":"Countering corruption in education","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-education\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-education\/","sub":[]},{"name":"Countering corruption in government bodies","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-government-bodies\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-government-bodies\/","sub":[]},{"name":"Countering corruption in health care","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-health-care\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-health-care\/","sub":[]},{"name":"Countering corruption in internal affairs bodies","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-internal-affairs-bodies\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-internal-affairs-bodies\/","sub":[]},{"name":"Countering corruption in judicial system","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-judicial-system\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-judicial-system\/","sub":[]},{"name":"Countering corruption in municipal institutions","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-municipal-institutions\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-municipal-institutions\/","sub":[]},{"name":"Countering corruption in preschool educational institutions","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-preschool-educational-institutions\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-preschool-educational-institutions\/","sub":[]},{"name":"Countering corruption in tax authorities","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-tax-authorities\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-civil-service-system\/countering-corruption-in-tax-authorities\/","sub":[]}]},{"name":"Countering corruption in the private sector","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-private-sector\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-private-sector\/","sub":[{"name":"Countering corruption and fraud in a company","path":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-private-sector\/countering-corruption-and-fraud-in-a-company\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/countering-corruption-in-the-private-sector\/countering-corruption-and-fraud-in-a-company\/","sub":[]}]},{"name":"Legal and institutional framework for countering corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/","sub":[{"name":"Actual problems of counteraction of corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/actual-problems-of-counteraction-of-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/actual-problems-of-counteraction-of-corruption\/","sub":[]},{"name":"Anti-corruption measures","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/anti-corruption-measures\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/anti-corruption-measures\/","sub":[]},{"name":"Anti-corruption plan","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/anti-corruption-plan\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/anti-corruption-plan\/","sub":[]},{"name":"Basic principles of countering corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/basic-principles-of-countering-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/basic-principles-of-countering-corruption\/","sub":[]},{"name":"Decree of the Government of the Russian Federation on Counteraction of Corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/decree-of-the-government-of-the-russian-federation-on-counteraction-of-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/decree-of-the-government-of-the-russian-federation-on-counteraction-of-corruption\/","sub":[]},{"name":"Foreign experience in countering corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/foreign-experience-in-countering-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/foreign-experience-in-countering-corruption\/","sub":[]},{"name":"Infringements in the field of counteraction of corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/infringements-in-the-field-of-counteraction-of-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/infringements-in-the-field-of-counteraction-of-corruption\/","sub":[]},{"name":"International anti-corruption standards","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/international-anti-corruption-standards\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/international-anti-corruption-standards\/","sub":[]},{"name":"Legal mechanisms of counteraction of corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/legal-mechanisms-of-counteraction-of-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/legal-mechanisms-of-counteraction-of-corruption\/","sub":[]},{"name":"National Anti-Corruption Strategy","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/national-anti-corruption-strategy\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/national-anti-corruption-strategy\/","sub":[]},{"name":"State policy in the field of anti-corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/state-policy-in-the-field-of-anti-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/state-policy-in-the-field-of-anti-corruption\/","sub":[]},{"name":"The main directions of countering corruption","path":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/the-main-directions-of-countering-corruption\/","link":"\/challenges\/corporate-fraud\/countering-corruption\/legal-and-institutional-framework-for-countering-corruption\/the-main-directions-of-countering-corruption\/","sub":[]}]}]},{"name":"Fraud prevention","path":"\/challenges\/corporate-fraud\/fraud-prevention\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/","sub":[{"name":"Corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/","link":"","sub":[{"name":"Classification of corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/classification-of-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/classification-of-corporate-fraud\/","sub":[]},{"name":"Countering corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/","sub":[{"name":"Corporate anti-fraud guidelines","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/corporate-anti-fraud-guidelines\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/corporate-anti-fraud-guidelines\/","sub":[]},{"name":"Corporate anti-fraud policy","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/corporate-anti-fraud-policy\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/corporate-anti-fraud-policy\/","sub":[]},{"name":"Methods of countering corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/methods-of-countering-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/methods-of-countering-corporate-fraud\/","sub":[]},{"name":"Ways to prevent corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/ways-to-prevent-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/countering-corporate-fraud\/ways-to-prevent-corporate-fraud\/","sub":[]}]},{"name":"Investigation of corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/investigation-of-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/investigation-of-corporate-fraud\/","sub":[]},{"name":"Signs of corporate fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/signs-of-corporate-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/corporate-fraud\/signs-of-corporate-fraud\/","sub":[]}]},{"name":"Economic fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/economic-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/economic-fraud\/","sub":[{"name":"Identification of fraud committed in the field of economics","path":"\/challenges\/corporate-fraud\/fraud-prevention\/economic-fraud\/identification-of-fraud-committed-in-the-field-of-economics\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/economic-fraud\/identification-of-fraud-committed-in-the-field-of-economics\/","sub":[]}]},{"name":"Financial fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/financial-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/financial-fraud\/","sub":[{"name":"Types of financial fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/financial-fraud\/types-of-financial-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/financial-fraud\/types-of-financial-fraud\/","sub":[]}]},{"name":"Fraud in the field of computer information","path":"\/challenges\/corporate-fraud\/fraud-prevention\/fraud-in-the-field-of-computer-information\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/fraud-in-the-field-of-computer-information\/","sub":[{"name":"Types of Internet fraud and how to deal with them","path":"\/challenges\/corporate-fraud\/fraud-prevention\/fraud-in-the-field-of-computer-information\/types-of-internet-fraud-and-how-to-deal-with-them\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/fraud-in-the-field-of-computer-information\/types-of-internet-fraud-and-how-to-deal-with-them\/","sub":[]}]},{"name":"Information reliability control","path":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/","sub":[{"name":"Digital fingerprinting","path":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/digital-fingerprinting\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/digital-fingerprinting\/","sub":[]},{"name":"Email spoofing","path":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/email-spoofing\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/email-spoofing\/","sub":[]},{"name":"Image authenticity verification","path":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/image-authenticity-verification\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/information-reliability-control\/image-authenticity-verification\/","sub":[]}]},{"name":"Insurance fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/","sub":[{"name":"Fraud in an insurance organization","path":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/fraud-in-an-insurance-organization\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/fraud-in-an-insurance-organization\/","sub":[]},{"name":"Insurance fraud detection methods","path":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/insurance-fraud-detection-methods\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/insurance-fraud-detection-methods\/","sub":[]},{"name":"Insurance fraud prevention measures","path":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/insurance-fraud-prevention-measures\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/insurance-fraud\/insurance-fraud-prevention-measures\/","sub":[]}]},{"name":"The difference between fraud and embezzlement and waste","path":"\/challenges\/corporate-fraud\/fraud-prevention\/the-difference-between-fraud-and-embezzlement-and-waste\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/the-difference-between-fraud-and-embezzlement-and-waste\/","sub":[]},{"name":"Types of financial fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/","sub":[{"name":"False financial reporting, errors and fraud","path":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/false-financial-reporting,-errors-and-fraud\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/false-financial-reporting,-errors-and-fraud\/","sub":[]},{"name":"Financial reporting fraud detection methods","path":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/false-financial-reporting,-errors-and-fraud-financial-reporting-fraud-detection-methods\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/false-financial-reporting,-errors-and-fraud-financial-reporting-fraud-detection-methods\/","sub":[]},{"name":"Financial fraud on the Internet","path":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/financial-fraud-on-the-internet\/","link":"\/challenges\/corporate-fraud\/fraud-prevention\/types-of-financial-fraud\/financial-fraud-on-the-internet\/","sub":[]}]}]},{"name":"Identification of kickbacks","path":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/","link":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/","sub":[{"name":"How to identify kickbacks in procurement","path":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/how-to-identify-kickbacks-in-procurement\/","link":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/how-to-identify-kickbacks-in-procurement\/","sub":[]},{"name":"How to identify kickbacks in sales","path":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/how-to-identify-kickbacks-in-sales\/","link":"\/challenges\/corporate-fraud\/identification-of-kickbacks\/how-to-identify-kickbacks-in-sales\/","sub":[]}]},{"name":"Insider identification","path":"\/challenges\/corporate-fraud\/insider-identification\/","link":"\/challenges\/corporate-fraud\/insider-identification\/","sub":[{"name":"Insiders in banks","path":"\/challenges\/corporate-fraud\/insider-identification\/insiders-in-banks\/","link":"\/challenges\/corporate-fraud\/insider-identification\/insiders-in-banks\/","sub":[]},{"name":"Insider trading","path":"\/challenges\/corporate-fraud\/insider-identification\/insider-trading\/","link":"\/challenges\/corporate-fraud\/insider-identification\/insider-trading\/","sub":[]}]}]},{"name":"Data loss prevention","path":"\/challenges\/data-loss-prevention\/","link":"","sub":[{"name":"How a DLP system works","path":"\/challenges\/data-loss-prevention\/how-a-dlp-system-works\/","link":"\/challenges\/data-loss-prevention\/how-a-dlp-system-works\/","sub":[]},{"name":"How to choose a DLP system","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/","sub":[{"name":"Comparison of DLP systems","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/comparison-of-dlp-systems\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/comparison-of-dlp-systems\/","sub":[]},{"name":"DLP for small businesses","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-for-small-businesses\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-for-small-businesses\/","sub":[]},{"name":"DLP system requirements","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-system-requirements\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-system-requirements\/","sub":[]},{"name":"DLP systems market analysis","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-systems-market-analysis\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-systems-market-analysis\/","sub":[]},{"name":"DLP systems test","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-systems-test\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/dlp-systems-test\/","sub":[]},{"name":"Terms of reference for the purchase of a DLP system","path":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/terms-of-reference-for-the-purchase-of-a-dlp-system\/","link":"\/challenges\/data-loss-prevention\/how-to-choose-a-dlp-system\/terms-of-reference-for-the-purchase-of-a-dlp-system\/","sub":[]}]},{"name":"Implementation of DLP systems","path":"\/challenges\/data-loss-prevention\/implementation-of-dlp-systems\/","link":"\/challenges\/data-loss-prevention\/implementation-of-dlp-systems\/","sub":[{"name":"Development of terms of reference for the implementation of a DLP system","path":"\/challenges\/data-loss-prevention\/implementation-of-dlp-systems\/development-of-terms-of-reference-for-the-implementation-of-a-dlp-system\/","link":"\/challenges\/data-loss-prevention\/implementation-of-dlp-systems\/development-of-terms-of-reference-for-the-implementation-of-a-dlp-system\/","sub":[]}]},{"name":"Information security incident management","path":"\/challenges\/data-loss-prevention\/information-security-incident-management\/","link":"\/challenges\/data-loss-prevention\/information-security-incident-management\/","sub":[]},{"name":"Configuring DLP","path":"\/challenges\/data-loss-prevention\/configuring-dlp\/","link":"\/challenges\/data-loss-prevention\/configuring-dlp\/","sub":[]},{"name":"DLP systems cost","path":"\/challenges\/data-loss-prevention\/dlp-systems-cost\/","link":"\/challenges\/data-loss-prevention\/dlp-systems-cost\/","sub":[]}]},{"name":"Information security","path":"\/challenges\/information-security\/","link":"","sub":[{"name":"Information security analytics","path":"\/challenges\/information-security\/information-security-analytics\/","link":"\/challenges\/information-security\/information-security-analytics\/","sub":[{"name":"Information leaks","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/","sub":[{"name":"Information leakage cases","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/","sub":[{"name":"Consequences of information leakage","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/consequences-of-information-leakage\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/consequences-of-information-leakage\/","sub":[]},{"name":"Damage from information leakage","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/damage-from-information-leakage\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/damage-from-information-leakage\/","sub":[]},{"name":"Information leakage cases in healthcare","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/information-leakage-cases-in-healthcare\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-cases\/information-leakage-cases-in-healthcare\/","sub":[]}]},{"name":"Information leakage causes","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/","sub":[{"name":"Main channels of information leakage","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/main-channels-of-information-leakage\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/main-channels-of-information-leakage\/","sub":[]},{"name":"Reasons and conditions for leakage of protected information","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/reasons-and-conditions-for-leakage-of-protected-information\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/reasons-and-conditions-for-leakage-of-protected-information\/","sub":[]},{"name":"Reasons for information leakage at an enterprise","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/reasons-for-information-leakage-at-an-enterprise\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/reasons-for-information-leakage-at-an-enterprise\/","sub":[]},{"name":"Sources of information leaks","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/sources-of-information-leaks\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/information-leakage-causes\/sources-of-information-leaks\/","sub":[]}]},{"name":"Methods of prevention of information leakage","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/","sub":[{"name":"Countering information leaks","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/countering-information-leaks\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/countering-information-leaks\/","sub":[]},{"name":"How to avoid information leakage","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/how-to-avoid-information-leakage\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/how-to-avoid-information-leakage\/","sub":[]},{"name":"Information leak investigation","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/information-leak-investigation\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/information-leak-investigation\/","sub":[]},{"name":"Types of information leakage threats","path":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/types-of-information-leakage-threats\/","link":"\/challenges\/information-security\/information-security-analytics\/information-leaks\/methods-of-prevention-of-information-leakage\/types-of-information-leakage-threats\/","sub":[]}]}]},{"name":"Methods of ensuring information security","path":"\/challenges\/information-security\/information-security-analytics\/research-in-the-field-of-information-security\/methods-of-ensuring-information-security\/","link":"\/challenges\/information-security\/information-security-analytics\/research-in-the-field-of-information-security\/methods-of-ensuring-information-security\/","sub":[]}]},{"name":"Information security basics","path":"\/challenges\/information-security\/information-security-basics\/","link":"\/challenges\/information-security\/information-security-basics\/","sub":[{"name":"Information security documents","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/","sub":[{"name":"Bank information security documents","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/bank-information-security-documents\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/bank-information-security-documents\/","sub":[]},{"name":"Information security document templates","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-document-templates\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-document-templates\/","sub":[]},{"name":"Information security instructions","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/","sub":[{"name":"Information security administrator instructions","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-administrator-instructions\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-administrator-instructions\/","sub":[]},{"name":"Information security briefing log","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-briefing-log\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-briefing-log\/","sub":[]},{"name":"Information security department regulations","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-department-regulations\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-department-regulations\/","sub":[]},{"name":"Information security engineer job description","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-engineer-job-description\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-engineer-job-description\/","sub":[]},{"name":"Information security specialist job description","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-engineer-job-description\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-engineer-job-description\/","sub":[]},{"name":"Information security service","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-service\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/information-security-service\/","sub":[]},{"name":"Regulations on information security service","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/regulations-on-information-security-service\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-instructions\/regulations-on-information-security-service\/","sub":[]}]},{"name":"Information security regulations","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-regulations\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/information-security-regulations\/","sub":[]},{"name":"List of documents on information security in an organization","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/list-of-documents-on-information-security-in-an-organization\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/list-of-documents-on-information-security-in-an-organization\/","sub":[]},{"name":"Information security documents","path":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/the-basic-principles-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-documents\/the-basic-principles-of-information-security\/","sub":[]}]},{"name":"Information security in industries","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/","sub":[{"name":"Business information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/business-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/business-information-security\/","sub":[]},{"name":"Corporate information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/","sub":[{"name":"Enterprise corporate security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/enterprise-corporate-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/enterprise-corporate-security\/","sub":[]},{"name":"Information security in a corporation","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/information-security-in-a-corporation\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/corporate-information-security\/information-security-in-a-corporation\/","sub":[]}]},{"name":"Information security in manufacturing","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-in-manufacturing\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-in-manufacturing\/","sub":[]},{"name":"Information security of databases","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-databases\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-databases\/","sub":[]},{"name":"Information security of document flow","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-document-flow\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-document-flow\/","sub":[]},{"name":"Information security of economic activity","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-economic-activity\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-economic-activity\/","sub":[]},{"name":"Information security of enterprises","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/","sub":[{"name":"Enterprise information security, where to start","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/enterprise-information-security,-where-to-start\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/enterprise-information-security,-where-to-start\/","sub":[]},{"name":"Examples of enterprise information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/examples-of-enterprise-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/examples-of-enterprise-information-security\/","sub":[]},{"name":"Information security of industrial enterprises","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/information-security-of-industrial-enterprises\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/information-security-of-industrial-enterprises\/","sub":[]},{"name":"Information security rules at an enterprise","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/information-security-rules-at-an-enterprise\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/information-security-rules-at-an-enterprise\/","sub":[]},{"name":"Internal security of an enterprise","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/internal-security-of-an-enterprise\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/internal-security-of-an-enterprise\/","sub":[]},{"name":"Technical support of information security of an enterprise","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/technical-support-of-information-security-of-an-enterprise\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-security-of-enterprises\/technical-support-of-information-security-of-an-enterprise\/","sub":[]}]},{"name":"Information systems security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/","sub":[{"name":"Complex systems of information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/complex-systems-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/complex-systems-of-information-security\/","sub":[]},{"name":"Ensuring banking system information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/ensuring-banking-system-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/ensuring-banking-system-information-security\/","sub":[]},{"name":"Information security in financial systems","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-in-financial-systems\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-in-financial-systems\/","sub":[]},{"name":"Information security in the national security system","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-in-the-national-security-system\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-in-the-national-security-system\/","sub":[]},{"name":"Information security of automated systems (ACS)","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-automated-systems-(acs)\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-automated-systems-(acs)\/","sub":[]},{"name":"Information security of computer systems and networks","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-computer-systems-and-networks\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-computer-systems-and-networks\/","sub":[]},{"name":"Information security of electronic payment systems","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-electronic-payment-systems\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-electronic-payment-systems\/","sub":[]},{"name":"Information security of telecommunication systems","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-telecommunication-systems\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-of-telecommunication-systems\/","sub":[]},{"name":"Information security systems development","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-systems-development\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-security-systems-development\/","sub":[]},{"name":"Information systems security architecture","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-architecture\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-architecture\/","sub":[]},{"name":"Information systems security classes","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-classes\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-classes\/","sub":[]},{"name":"Information systems security mechanisms","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-mechanisms\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-systems-security\/information-systems-security-mechanisms\/","sub":[]}]},{"name":"Information technology security in law enforcement","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-technology-security-in-law-enforcement\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-technology-security-in-law-enforcement\/","sub":[{"name":"Ensuring information security of the FSB of the Russian Federation","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-technology-security-in-law-enforcement\/ensuring-information-security-of-the-fsb-of-the-russian-federation\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/information-technology-security-in-law-enforcement\/ensuring-information-security-of-the-fsb-of-the-russian-federation\/","sub":[]}]},{"name":"Office information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/office-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-industries\/office-information-security\/","sub":[]}]},{"name":"Information security in Russia and the world","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-russia-and-the-world\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-russia-and-the-world\/","sub":[{"name":"Fundamentals of national information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-in-russia-and-the-world\/fundamentals-of-national-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-in-russia-and-the-world\/fundamentals-of-national-information-security\/","sub":[]}]},{"name":"Information security threats","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/","sub":[{"name":"Factors creating a threat to information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/factors-creating-a-threat-to-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/factors-creating-a-threat-to-information-security\/","sub":[]},{"name":"Information security threat analysis","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/information-security-threat-analysis\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/information-security-threat-analysis\/","sub":[]},{"name":"The main types of information security threats","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/","sub":[{"name":"External threats to information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/external-threats-to-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/external-threats-to-information-security\/","sub":[]},{"name":"Intentional threats to information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/intentional-threats-to-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/intentional-threats-to-information-security\/","sub":[]},{"name":"Internal information security threats","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/internal-information-security-threats\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/internal-information-security-threats\/","sub":[]},{"name":"Potential threats to information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/potential-threats-to-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/potential-threats-to-information-security\/","sub":[]},{"name":"Unintentional threats to information security","path":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/unintentional-threats-to-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/information-security-threats\/the-main-types-of-information-security-threats\/unintentional-threats-to-information-security\/","sub":[]}]}]},{"name":"Key aspects of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/","sub":[{"name":"Basic concepts of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/basic-concepts-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/basic-concepts-of-information-security\/","sub":[]},{"name":"Basics of computer security, information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/basics-of-computer-security,-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/basics-of-computer-security,-information-security\/","sub":[]},{"name":"Fields of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/fields-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/fields-of-information-security\/","sub":[]},{"name":"Foundations of national security information","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/foundations-of-national-security-information\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/foundations-of-national-security-information\/","sub":[]},{"name":"Goals and objectives of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/goals-and-objectives-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/goals-and-objectives-of-information-security\/","sub":[]},{"name":"Information security doctrine","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/","sub":[{"name":"Comparison of information security doctrines","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/comparison-of-information-security-doctrines\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/comparison-of-information-security-doctrines\/","sub":[]},{"name":"New doctrine of information security of the Russian Federation","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/new-doctrine-of-information-security-of-the-russian-federation\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/new-doctrine-of-information-security-of-the-russian-federation\/","sub":[]},{"name":"State doctrine of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/state-doctrine-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/state-doctrine-of-information-security\/","sub":[]},{"name":"The main provisions of the doctrine of information security of the Russian Federation","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/the-main-provisions-of-the-doctrine-of-information-security-of-the-russian-federation\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/the-main-provisions-of-the-doctrine-of-information-security-of-the-russian-federation\/","sub":[]},{"name":"The strategic goal of the information security doctrine of the Russian Federation","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/the-strategic-goal-of-the-information-security-doctrine-of-the-russian-federation\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-doctrine\/the-strategic-goal-of-the-information-security-doctrine-of-the-russian-federation\/","sub":[]}]},{"name":"Information security requirements","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-requirements\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-requirements\/","sub":[]},{"name":"Information security terms","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-terms\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/information-security-terms\/","sub":[]},{"name":"Properties of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/properties-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/properties-of-information-security\/","sub":[]},{"name":"Regulation on information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/regulation-on-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/regulation-on-information-security\/","sub":[]},{"name":"The basic principles of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/","sub":[{"name":"Basic software and hardware measures to ensure information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/basic-software-and-hardware-measures-to-ensure-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/basic-software-and-hardware-measures-to-ensure-information-security\/","sub":[]},{"name":"Information security levels","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-levels\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-levels\/","sub":[]},{"name":"Information security management","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-management\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-management\/","sub":[]},{"name":"Information security measures","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-measures\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-measures\/","sub":[]},{"name":"Information security methods","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-methods\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-methods\/","sub":[]},{"name":"Information security problems","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-problems\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-problems\/","sub":[]},{"name":"Information security systems","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-systems\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-systems\/","sub":[]},{"name":"Information security tools","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-tools\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/information-security-tools\/","sub":[]},{"name":"Regulations for ensuring information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/regulations-for-ensuring-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-basic-principles-of-information-security\/regulations-for-ensuring-information-security\/","sub":[]}]},{"name":"The main components of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-main-components-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-main-components-of-information-security\/","sub":[]},{"name":"The main objects of information security","path":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-main-objects-of-information-security\/","link":"\/challenges\/information-security\/information-security-basics\/key-aspects-of-information-security\/the-main-objects-of-information-security\/","sub":[]}]},{"name":"Profiling","path":"\/challenges\/information-security\/information-security-basics\/profiling\/","link":"\/challenges\/information-security\/information-security-basics\/profiling\/","sub":[]}]},{"name":"Protection of information","path":"\/challenges\/information-security\/protection-of-information\/","link":"","sub":[{"name":"Protection of information","path":"\/challenges\/information-security\/protection-of-information\/information-security-in-russia-and-the-world\/","link":"\/challenges\/information-security\/protection-of-information\/information-security-in-russia-and-the-world\/","sub":[]},{"name":"Methods of information protection","path":"\/challenges\/information-security\/protection-of-information\/methods-of-information-protection\/","link":"\/challenges\/information-security\/protection-of-information\/methods-of-information-protection\/","sub":[]},{"name":"Protecting information on a USB flash drive","path":"\/challenges\/information-security\/protection-of-information\/protecting-information-on-a-usb-flash-drive\/","link":"\/challenges\/information-security\/protection-of-information\/protecting-information-on-a-usb-flash-drive\/","sub":[]},{"name":"Protection against data leaks","path":"\/challenges\/information-security\/protection-of-information\/protection-against-data-leaks\/","link":"\/challenges\/information-security\/protection-of-information\/protection-against-data-leaks\/","sub":[]},{"name":"Protection of information constituting a commercial secret","path":"\/challenges\/information-security\/protection-of-information\/protection-of-information-constituting-a-commercial-secret\/","link":"\/challenges\/information-security\/protection-of-information\/protection-of-information-constituting-a-commercial-secret\/","sub":[]}]}]},{"name":"Personal data protection","path":"\/challenges\/personal-data-protection\/","link":"","sub":[{"name":"Protection of personal information","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/","sub":[{"name":"Categories of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/categories-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/categories-of-personal-data\/","sub":[]},{"name":"Classification of personal data information systems","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/classification-of-personal-data-information-systems\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/classification-of-personal-data-information-systems\/","sub":[]},{"name":"Deletion of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/deletion-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/deletion-of-personal-data\/","sub":[]},{"name":"Emailing personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/emailing-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/emailing-personal-data\/","sub":[]},{"name":"Employee personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/employee-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/employee-personal-data\/","sub":[]},{"name":"Implementation of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/","sub":[{"name":"Assessment of the effectiveness of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/assessment-of-the-effectiveness-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/assessment-of-the-effectiveness-of-personal-data-protection\/","sub":[]},{"name":"Classes of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/classes-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/classes-of-personal-data-protection\/","sub":[]},{"name":"Constitution of the Russian Federation on personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/constitution-of-the-russian-federation-on-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/constitution-of-the-russian-federation-on-personal-data-protection\/","sub":[]},{"name":"Features of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/features-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/features-of-personal-data-protection\/","sub":[]},{"name":"FSTEC recommendations on personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/fstec-recommendations-on-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/fstec-recommendations-on-personal-data-protection\/","sub":[]},{"name":"History of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/history-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/history-of-personal-data-protection\/","sub":[]},{"name":"International personal data protection system","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/","sub":[{"name":"Personal data protection in Belarus","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-belarus\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-belarus\/","sub":[]},{"name":"Personal data protection in the Russian Federation","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-the-russian-federation\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-the-russian-federation\/","sub":[]},{"name":"Personal data protection in the US","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-the-us\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/international-personal-data-protection-system\/personal-data-protection-in-the-us\/","sub":[]}]},{"name":"Judicial practice on personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/judicial-practice-on-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/judicial-practice-on-personal-data-protection\/","sub":[]},{"name":"Legal protection of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/legal-protection-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/legal-protection-of-personal-data\/","sub":[]},{"name":"List of documents on personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-documents-on-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-documents-on-personal-data-protection\/","sub":[]},{"name":"List of personal data to be protected","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/","sub":[{"name":"Children's personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/childrens-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/childrens-personal-data-protection\/","sub":[]},{"name":"Cloud personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/cloud-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/cloud-personal-data-protection\/","sub":[]},{"name":"Employee personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/employee-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/employee-personal-data-protection\/","sub":[]},{"name":"Personal data protection at an enterprise","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-at-an-enterprise\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-at-an-enterprise\/","sub":[]},{"name":"Personal data protection in a DMS","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-dms\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-dms\/","sub":[]},{"name":"Personal data protection in a HOA","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-hoa\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-hoa\/","sub":[]},{"name":"Personal data protection in a hotel","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-hotel\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-a-hotel\/","sub":[]},{"name":"Personal data protection in banks","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-banks\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-banks\/","sub":[]},{"name":"Personal data protection in educational institutions","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-educational-institutions\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-educational-institutions\/","sub":[]},{"name":"Personal data protection in medical institutions","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-medical-institutions\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-medical-institutions\/","sub":[]},{"name":"Personal data protection in preschool educational institutions","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-preschool-educational-institutions\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-in-preschool-educational-institutions\/","sub":[]},{"name":"Personal data protection of clients of an organization","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-of-clients-of-an-organization\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-of-clients-of-an-organization\/","sub":[]},{"name":"Personal data protection on a personal computer","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-on-a-personal-computer\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-on-a-personal-computer\/","sub":[]},{"name":"Personal data protection on the Internet","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-on-the-internet\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/list-of-personal-data-to-be-protected\/personal-data-protection-on-the-internet\/","sub":[]}]},{"name":"Measures to ensure personal data protection in an organization","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/measures-to-ensure-personal-data-protection-in-an-organization\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/measures-to-ensure-personal-data-protection-in-an-organization\/","sub":[]},{"name":"Organization policy in the field of personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/organization-policy-in-the-field-of-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/organization-policy-in-the-field-of-personal-data-protection\/","sub":[]},{"name":"Personal data protection action plan","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-action-plan\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-action-plan\/","sub":[]},{"name":"Personal data protection issues","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-issues\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-issues\/","sub":[]},{"name":"Personal data protection mode","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-mode\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-mode\/","sub":[]},{"name":"Personal data protection services","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-services\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-services\/","sub":[]},{"name":"Personal data protection system certification","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-system-certification\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-system-certification\/","sub":[]},{"name":"Personal data protection systems","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-systems\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-protection-systems\/","sub":[]},{"name":"Personal data security means","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-security-means\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-security-means\/","sub":[]},{"name":"Personal data security requirements","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-security-requirements\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/personal-data-security-requirements\/","sub":[]},{"name":"Regulatory framework for personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/regulatory-framework-for-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/regulatory-framework-for-personal-data-protection\/","sub":[]},{"name":"Requirements for personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/requirements-for-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/requirements-for-personal-data-protection\/","sub":[]},{"name":"Technical protection of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/technical-protection-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/technical-protection-of-personal-data\/","sub":[]},{"name":"Who controls personal data protection","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/who-controls-personal-data-protection\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/implementation-of-personal-data-protection\/who-controls-personal-data-protection\/","sub":[]}]},{"name":"Personal data leaks","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-leaks\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-leaks\/","sub":[{"name":"Implications of personal data leaks","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-leaks\/implications-of-personal-data-leaks\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-leaks\/implications-of-personal-data-leaks\/","sub":[]}]},{"name":"Personal data processing","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/","sub":[{"name":"Legal basis for personal data processing","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/legal-basis-for-personal-data-processing\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/legal-basis-for-personal-data-processing\/","sub":[]},{"name":"Personal data processing in a bank","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-in-a-bank\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-in-a-bank\/","sub":[]},{"name":"Personal data processing methods","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-methods\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-methods\/","sub":[]},{"name":"Personal data processing of a legal entity","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-of-a-legal-entity\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-of-a-legal-entity\/","sub":[]},{"name":"Personal data processing policy","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-policy\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/personal-data-processing-policy\/","sub":[]},{"name":"Purpose of personal data processing","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/purpose-of-personal-data-processing\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-processing\/purpose-of-personal-data-processing\/","sub":[]}]},{"name":"Personal data subject","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/","sub":[{"name":"Personal data of civil servants","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-civil-servants\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-civil-servants\/","sub":[]},{"name":"Personal data of housing and communal services","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-housing-and-communal-services\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-housing-and-communal-services\/","sub":[]},{"name":"Personal data of minors","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-minors\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-minors\/","sub":[]},{"name":"Personal data of police officers","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-police-officers\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/personal-data-subject\/personal-data-of-police-officers\/","sub":[]}]},{"name":"Sale of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/sale-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/sale-of-personal-data\/","sub":[]},{"name":"Storage of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/","sub":[{"name":"Regulations on employee personal data storage","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/regulations-on-employee-personal-data-storage\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/regulations-on-employee-personal-data-storage\/","sub":[]},{"name":"Regulations on the procedure for storing employee personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/regulations-on-the-procedure-for-storing-employee-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/regulations-on-the-procedure-for-storing-employee-personal-data\/","sub":[]},{"name":"Storage retention period of employee personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/storage-retention-period-of-employee-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/storage-retention-period-of-employee-personal-data\/","sub":[]},{"name":"The procedure for storing and using employee personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/the-procedure-for-storing-and-using-employee-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/the-procedure-for-storing-and-using-employee-personal-data\/","sub":[]},{"name":"Where is personal data stored","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/where-is-personal-data-stored\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/storage-of-personal-data\/where-is-personal-data-stored\/","sub":[]}]},{"name":"Transfer of personal data to third parties","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/transfer-of-personal-data-to-third-parties\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/transfer-of-personal-data-to-third-parties\/","sub":[]},{"name":"Types of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/types-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/types-of-personal-data\/","sub":[]},{"name":"Use of personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/use-of-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/use-of-personal-data\/","sub":[]},{"name":"What personal data is publicly available","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/","sub":[{"name":"Is full name personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-full-name-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-full-name-personal-data\/","sub":[]},{"name":"Is phone number personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-phone-number-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-phone-number-personal-data\/","sub":[]},{"name":"Is photo personal data","path":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-photo-personal-data\/","link":"\/challenges\/personal-data-protection\/protection-of-personal-information\/what-personal-data-is-publicly-available\/is-photo-personal-data\/","sub":[]}]}]}]},{"name":"Employee control","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/","sub":[{"name":"Assessment of staff in an organization","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/","sub":[{"name":"Assessment of staff efficiency","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/assessment-of-staff-efficiency\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/assessment-of-staff-efficiency\/","sub":[]},{"name":"Automated staff assessment system","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/automated-staff-assessment-system\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/automated-staff-assessment-system\/","sub":[]},{"name":"Improving working time efficiency","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/improving-working-time-efficiency\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/improving-working-time-efficiency\/","sub":[]},{"name":"Staff assessment methods in an organization","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/staff-assessment-methods-in-an-organization\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/assessment-of-staff-in-an-organization\/staff-assessment-methods-in-an-organization\/","sub":[]}]},{"name":"Staff motivation","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/","sub":[{"name":"Foreign experience in staff motivation","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/foreign-experience-in-staff-motivation\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/foreign-experience-in-staff-motivation\/","sub":[]},{"name":"Modern approaches to staff motivation","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/modern-approaches-to-staff-motivation\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/modern-approaches-to-staff-motivation\/","sub":[]},{"name":"Non-standard methods of staff motivation","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/non-standard-methods-of-staff-motivation\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/non-standard-methods-of-staff-motivation\/","sub":[]},{"name":"Staff motivation methods","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/staff-motivation-methods\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/staff-motivation-methods\/","sub":[]},{"name":"Theory and practice of staff motivation","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/theory-and-practice-of-staff-motivation\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/staff-motivation\/theory-and-practice-of-staff-motivation\/","sub":[]}]},{"name":"Time tracking","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/","sub":[{"name":"Automated employee time tracking","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/automated-employee-time-tracking\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/automated-employee-time-tracking\/","sub":[]},{"name":"Methods of time tracking","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/methods-of-time-tracking\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/methods-of-time-tracking\/","sub":[]},{"name":"Specificities of time tracking","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/specificities-of-time-tracking\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/specificities-of-time-tracking\/","sub":[]},{"name":"Time tracking of remote employees","path":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/time-tracking-of-remote-employees\/","link":"\/challenges\/time-tracking-and-employee-monitoring-software\/employee-control\/time-tracking\/time-tracking-of-remote-employees\/","sub":[]}]}]}]},{"name":"Industries","path":"\/industries\/","link":"","sub":[{"name":"Business services","path":"\/industries\/business-services\/","link":"\/industries\/business_services\/","sub":[{"name":"Competitive intelligence","path":"\/industries\/business-services\/competitive-intelligence\/","link":"\/industries\/business-services\/competitive-intelligence\/","sub":[{"name":"Competitive intelligence and industrial espionage comparative analysis","path":"\/industries\/business-services\/competitive-intelligence\/competitive-intelligence-and-industrial-espionage-comparative-analysis\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-intelligence-and-industrial-espionage-comparative-analysis\/","sub":[]},{"name":"Competitive wars","path":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/","sub":[{"name":"Competitive intelligence in an enterprise","path":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-in-an-enterprise\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-in-an-enterprise\/","sub":[]},{"name":"Competitive Intelligence on the Internet","path":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-on-the-internet\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-on-the-internet\/","sub":[]},{"name":"Competitive intelligence techniques","path":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-techniques\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-techniques\/","sub":[]},{"name":"Competitive intelligence methods abroad","path":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-techniques\/competitive-intelligence-methods-abroad\/","link":"\/industries\/business-services\/competitive-intelligence\/competitive-wars\/competitive-intelligence-techniques\/competitive-intelligence-methods-abroad\/","sub":[]}]},{"name":"Industrial espionage","path":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/","link":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/","sub":[{"name":"Examples of industrial espionage","path":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/examples-of-industrial-espionage\/","link":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/examples-of-industrial-espionage\/","sub":[]},{"name":"Risks related to industrial espionage","path":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/risks-related-to-industrial-espionage\/","link":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/risks-related-to-industrial-espionage\/","sub":[]},{"name":"Who can be the subject of industrial espionage","path":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/who-can-be-the-subject-of-industrial-espionage\/","link":"\/industries\/business-services\/competitive-intelligence\/industrial-espionage\/who-can-be-the-subject-of-industrial-espionage\/","sub":[]}]}]},{"name":"Trade secret protection","path":"\/industries\/business-services\/trade-secret-protection\/","link":"\/industries\/business-services\/trade-secret-protection\/","sub":[{"name":"Commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/","sub":[{"name":"Commercial bribery extortion","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-extortion\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-extortion\/","sub":[]},{"name":"Commercial bribery of foreign persons","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-of-foreign-persons\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-of-foreign-persons\/","sub":[]},{"name":"Commercial bribery statistics","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-statistics\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/commercial-bribery-statistics\/","sub":[]},{"name":"Criminal law characteristics of commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/criminal-law-characteristics-of-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/criminal-law-characteristics-of-commercial-bribery\/","sub":[]},{"name":"Criminal liability for commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/criminal-liability-for-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/criminal-liability-for-commercial-bribery\/","sub":[]},{"name":"History of the crime of commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/history-of-the-crime-of-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/history-of-the-crime-of-commercial-bribery\/","sub":[]},{"name":"How to prove commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/how-to-prove-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/how-to-prove-commercial-bribery\/","sub":[]},{"name":"Intermediation in commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/intermediation-in-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/intermediation-in-commercial-bribery\/","sub":[]},{"name":"Qualifying features of commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/qualifying-features-of-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/qualifying-features-of-commercial-bribery\/","sub":[]},{"name":"Small commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/small-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/small-commercial-bribery\/","sub":[]},{"name":"Subject of commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/subject-of-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/subject-of-commercial-bribery\/","sub":[]},{"name":"The difference between bribery and commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/the-difference-between-bribery-and-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/the-difference-between-bribery-and-commercial-bribery\/","sub":[]},{"name":"What is the danger of commercial bribery","path":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/what-is-the-danger-of-commercial-bribery\/","link":"\/industries\/business-services\/trade-secret-protection\/commercial-bribery\/what-is-the-danger-of-commercial-bribery\/","sub":[]}]},{"name":"Disclosure of trade secrets","path":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/","link":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/","sub":[{"name":"Disclosure of trade secrets after dismissal of an employee","path":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/disclosure-of-trade-secrets-after-dismissal-of-an-employee\/","link":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/disclosure-of-trade-secrets-after-dismissal-of-an-employee\/","sub":[]},{"name":"Dismissal for disclosure of trade secrets","path":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/dismissal-for-disclosure-of-trade-secrets\/","link":"\/industries\/business-services\/trade-secret-protection\/disclosure-of-trade-secrets\/dismissal-for-disclosure-of-trade-secrets\/","sub":[]}]}]},{"name":"Working with confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/","sub":[{"name":"Classification of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/classification-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/classification-of-confidential-information\/","sub":[]},{"name":"Confidential Information Law","path":"\/industries\/business-services\/working-with-confidential-information\/confidential-information-law\/","link":"\/industries\/business-services\/working-with-confidential-information\/confidential-information-law\/","sub":[]},{"name":"Disclosure of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/disclosure-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/disclosure-of-confidential-information\/","sub":[]},{"name":"FSTEC license for technical protection of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/fstec-license-for-technical-protection-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/fstec-license-for-technical-protection-of-confidential-information\/","sub":[]},{"name":"Legal regulation of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/legal-regulation-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/legal-regulation-of-confidential-information\/","sub":[]},{"name":"List of information constituting confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/list-of-information-constituting-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/list-of-information-constituting-confidential-information\/","sub":[]},{"name":"Measures to protect confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/measures-to-protect-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/measures-to-protect-confidential-information\/","sub":[]},{"name":"Methodology for assessing confidential information security","path":"\/industries\/business-services\/working-with-confidential-information\/methodology-for-assessing-confidential-information-security\/","link":"\/industries\/business-services\/working-with-confidential-information\/methodology-for-assessing-confidential-information-security\/","sub":[]},{"name":"Organization of protection of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/organization-of-protection-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/organization-of-protection-of-confidential-information\/","sub":[]},{"name":"Organization of storage of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/organization-of-storage-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/organization-of-storage-of-confidential-information\/","sub":[]},{"name":"Procedure for processing confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/procedure-for-processing-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/procedure-for-processing-confidential-information\/","sub":[]},{"name":"Regulations on protection of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/regulations-on-protection-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/regulations-on-protection-of-confidential-information\/","sub":[]},{"name":"Rules for handling confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/rules-for-handling-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/rules-for-handling-confidential-information\/","sub":[]},{"name":"Sale of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/sale-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/sale-of-confidential-information\/","sub":[]},{"name":"Theft of confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/theft-of-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/theft-of-confidential-information\/","sub":[]},{"name":"Transfer of confidential information by email","path":"\/industries\/business-services\/working-with-confidential-information\/transfer-of-confidential-information-by-email\/","link":"\/industries\/business-services\/working-with-confidential-information\/transfer-of-confidential-information-by-email\/","sub":[]},{"name":"What information constitutes confidential information","path":"\/industries\/business-services\/working-with-confidential-information\/what-information-constitutes-confidential-information\/","link":"\/industries\/business-services\/working-with-confidential-information\/what-information-constitutes-confidential-information\/","sub":[]},{"name":"Working with confidential documents","path":"\/industries\/business-services\/working-with-confidential-information\/working-with-confidential-documents\/","link":"\/industries\/business-services\/working-with-confidential-information\/working-with-confidential-documents\/","sub":[]}]},{"name":"Countering terrorism","path":"\/industries\/business-services\/countering-terrorism\/","link":"\/industries\/business-services\/countering-terrorism\/","sub":[]}]},{"name":"Education","path":"\/industries\/education\/","link":"\/industries\/education\/","sub":[{"name":"Information security of educational institutions","path":"\/industries\/education\/information-security-of-educational-institutions\/","link":"\/industries\/education\/information-security-of-educational-institutions\/","sub":[]}]},{"name":"Financial services","path":"\/industries\/financial-services\/","link":"\/industries\/financial_services\/","sub":[{"name":"Bank information security","path":"\/industries\/financial-services\/bank-information-security\/","link":"\/industries\/financial-services\/bank-information-security\/","sub":[{"name":"Bank fraud","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/","sub":[{"name":"Anti-fraud system in the banking sector","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/anti-fraud-system-in-the-banking-sector\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/anti-fraud-system-in-the-banking-sector\/","sub":[]},{"name":"Bank information security threats","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/bank-information-security-threats\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/bank-information-security-threats\/","sub":[]},{"name":"Credit fraud investigation technique","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/credit-fraud\/credit-fraud-investigation-technique\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/credit-fraud\/credit-fraud-investigation-technique\/","sub":[]},{"name":"Types of bank fraud","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/","sub":[{"name":"Bank account fraud","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/bank-account-fraud\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/bank-account-fraud\/","sub":[]},{"name":"Bank card fraud","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/bank-card-fraud\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/bank-card-fraud\/","sub":[]},{"name":"Credit fraud","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/credit-fraud\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/credit-fraud\/","sub":[]},{"name":"Fraud when applying for a loan by a bank employee","path":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/fraud-when-applying-for-a-loan-by-a-bank-employee\/","link":"\/industries\/financial-services\/bank-information-security\/bank-fraud\/types-of-bank-fraud\/fraud-when-applying-for-a-loan-by-a-bank-employee\/","sub":[]}]}]},{"name":"Violation of bank secrecy","path":"\/industries\/financial-services\/bank-information-security\/violation-of-bank-secrecy\/","link":"\/industries\/financial-services\/bank-information-security\/violation-of-bank-secrecy\/","sub":[{"name":"Consequences of disclosure of bank secrecy","path":"\/industries\/financial-services\/bank-information-security\/violation-of-bank-secrecy\/consequences-of-disclosure-of-bank-secrecy\/","link":"\/industries\/financial-services\/bank-information-security\/violation-of-bank-secrecy\/consequences-of-disclosure-of-bank-secrecy\/","sub":[]}]}]}]},{"name":"Government","path":"\/industries\/government\/","link":"\/industries\/government\/","sub":[{"name":"Information security of state institutions","path":"\/industries\/government\/information-security-of-state-institutions\/","link":"\/industries\/government\/information-security-of-state-institutions\/","sub":[]}]},{"name":"Healthcare","path":"\/industries\/healthcare\/","link":"\/industries\/healthcare\/","sub":[{"name":"Information security in healthcare","path":"\/industries\/healthcare\/information-security-in-healthcare\/","link":"\/industries\/healthcare\/information-security-in-healthcare\/","sub":[]}]},{"name":"Insurance","path":"\/industries\/insurance\/","link":"\/industries\/insurance\/","sub":[{"name":"Information security of insurance companies","path":"\/industries\/insurance\/information-security-of-insurance-companies\/","link":"\/industries\/insurance\/information-security-of-insurance-companies\/","sub":[]}]},{"name":"Technology","path":"\/industries\/technology\/","link":"\/industries\/technology\/","sub":[]},{"name":"Manufacturing","path":"\/industries\/manufacturing\/","link":"\/industries\/manufacturing\/","sub":[]},{"name":"Retail","path":"\/industries\/retail\/","link":"\/industries\/retail\/","sub":[]},{"name":"Energy","path":"\/industries\/energy\/","link":"\/industries\/energy\/","sub":[]},{"name":"Hospitality","path":"\/industries\/hospitality\/","link":"\/industries\/hospitality\/","sub":[]},{"name":"Construction","path":"\/industries\/construction\/","link":"\/industries\/construction\/","sub":[]}]}]
Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyberincidents.
We use cookies to analyze our website usage, make our service more effective, and improve user experience. By continuing to use our website, you are agreeing to our policy.