🎁BACK-TO-SCHOOL DEAL. Subscribe Now to get 40% OFF at only 8.49 USD/month, only valid until Sep 30th, 2024

Question

Question
Mabel is a government employee who needs to share a document containing contractor proprietary information with her supervisor. Which of the following describes the most appropriate way for Mabel to do this? Save it to a shared folder accessible to their team. Leave a printed copy on her supervisor's desk after working hours. Encrypt it and send it via digitally signed Government e-mail. E-mail it using her personal $e$-mail account.

Asked By EnchantedHorizon83 at

Answered By Expert

Jaden

Expert · 2.1k answers · 2k people helped

The image displays a multiple-choice question regarding the appropriate method for a government employee named Mabel to share a document containing proprietary information with her supervisor. The options provided are:

1. Save it to a shared folder accessible to their team.

2. Leave a printed copy on her supervisor's desk after working hours.

3. Encrypt it and send it via digitally signed Government e-mail.

4. E-mail it using her personal e-mail account.

#### Solution By Steps

***Step 1: Assess Information Sensitivity***

Proprietary information is sensitive and should be handled according to strict security protocols to prevent unauthorized access.

***Step 2: Evaluate Options for Security***

Options involving personal accounts or leaving physical copies unsecured are not secure. A shared folder may not provide sufficient security unless it has specific controls for sensitive information.

***Step 3: Determine the Most Secure Option***

Encrypting the document and sending it via a digitally signed government email provides both verification of the sender's identity and protection of the document's contents.

#### Final Answer

Encrypt it and send it via digitally signed Government e-mail.

#### Key Concept

Information Security

#### Key Concept Explanation

Information security involves protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to provide confidentiality, integrity, and availability.