714 ITU‐T's Technical Reports and Specifications metrical indicators should include setting mode of search keywords, use the degree of semantic web technology, detailed rating of datasets. 6.4 Security management Data security management is a way to maintain the integrity of data and to make sure that the data is not accessible to unauthorized parties or susceptible to corruption of data50. Data security is put in place to ensure privacy in addition or protecting this data. Data itself is stored on network servers, possible personal computers and in the form of columns and rows. This data can be anything from personal files to intellectual property and even top‐secret information. Data can be considered as anything that can be understood and interpreted by humans. Because the internet is a growing phenomenon, there was and always will be an emphasis on protecting personal or company data. Computer users, as time goes on, tend to be slightly more aware of their files, but are still encouraged to use some sort of data security. Data security methods can be acquired by using specific software solutions or hardware mechanisms51. Data can be encrypted or unreadable to a person with no access. When encrypting this data, mathematical sequences and algorithms are used to scramble data. Encryption allows only an approved party to decode this unreadable text with a key. Only those that have this key can access any information. Authentication is another form of data security to be used for more daily access52. A sign‐on to an email account, bank account etc., only allows the user with the proper key or password. The most commonly used method of keeping data protected is with data security software. This software keeps unauthorized parties from accessing private data and offers a variety of different options. Some of these options include requiring a sign‐on to email accounts, rewriting of software, and being able to control security options remotely. Data can also be protected with IP security. This means that data can be protected from a hacker while in transit. One of the biggest reasons to keep data protected is because there are many corporations that hacker want to target and breach. Data security tends to be necessary for large businesses, but the small ones usually have fewer infrastructures in place, making the information, not a great loss if breached. Depending on the services and content that is to be protected, there can be preventative measures to protect the information further. For example Windows Rights Management Services (RMS) can be set to control whether or not the recipient of an email can be read and viewed, edited, copied or saved; these setting can also set an expiration date of a specific document53. By keeping data secured, it is possible to give different access to different people. For instance, sales associates can have access to their sales databases but are unable to access another sales associate information or business information (e.g., accounts payable, accounts receivable). Creating a single storage location (or server) for the data, and assigning individuals with different access, keeping up with data is a breeze. It makes it easier to maintain the data and permits a quick transfer to another storage location if needed. Data security software can also serve as a source to make secure sites (that give access to data files) can only be accessed by authorized personnel. ____________________ 50 Please see: http://research.cs.wisc.edu/wind/Publications/zfs‐corruption‐fast10.pdf . 51 Please see: http://datasecuritymanagement.com/. 52 Please see: http://www.spamlaws.com/data‐security.html. 53 Please see:https://technet.microsoft.com/en‐us/library/dd277323.aspx.