Definitions[]
Executive Order 13526[]
Information is
“ | any knowledge that can be communicated or documentary material, regardless of its physical form or characteristics, that is owned by, is produced by or for, or is under the control of the United States Government.[1] | ” |
General[]
Information is
“ | [m]eaningful data; the result of processing data by computer or other means.[2] | ” |
“ | intelligence or knowledge capable of being represented in forms suitable for communication, storage or processing.[3] | ” |
“ | [t]he intelligence derived from the data on or about a system, or the intelligence obtained from the structure or organization of that data.[4] | ” |
Intelligence[]
Information is
“ | [u]nprocessed data of every description which may be used in the production of intelligence.[5] | ” |
“ | unevaluated material, at all levels of reliability and from any source, which may contain intelligence information.[6] | ” |
“ | [t]he intelligence derived from the data on or about a system, or the intelligence obtained from the structure or organization of that data.[7] | ” |
Law enforcement[]
Information
“ | includes any data about people, organizations, events, incidents, or objects, regardless of the medium in which it exists. Information received by law enforcement agencies can be categorized into three general areas: general data, tips and leads data, and criminal intelligence data.[8] | ” |
Military[]
Information is
“ | 1. [f]acts, data, or instructions in any medium or form. 2. The meaning that a human assigns to data by means of the known conventions used in their representation.[9] | ” |
Office of Management and Budget[]
Information is
“ | any statement or estimate of fact or opinion, regardless of form or format, whether in numerical, graphic, or narrative form, and whether oral or maintained on paper, electronic or other media.[10] | ” |
“ | any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual forms.[11] | ” |
U.S. Department of Justice[]
Information is
“ | [p]ieces of raw, unanalyzed data that identify persons, evidence, or events or illustrate processes that possibly indicate the incidence of a criminal event or witnesses or evidence of a criminal event.[12] | ” |
U.S. federal government[]
Information is
“ | any communicable knowledge or documentary material, regardless of its physical form or characteristics, that is owned by, is produced by or for, or is under the control of the Federal Government.[13] | ” |
Overview[]
Information is the result of processing, gathering, manipulating and organizing data in a way that adds to the knowledge of the receiver. In other words, it is the context in which data is taken.
Information as a concept bears a diversity of meanings, from everyday usage to technical settings. Generally speaking, the concept of information is closely related to notions of communication, control, data, form, instruction, knowledge, meaning, mental stimulus, pattern, perception, and representation.
Many people speak about the Information Age as the advent of the Knowledge Age or knowledge society, the information society, and information technologies, and even though informatics, information science and computer science are often in the spotlight, the word "information" is often used without careful consideration of the various meanings it has acquired.
Social and political implications[]
- Information is as vital to the healthy functioning of communities as clean air, safe streets, good schools and public health.
- — Knight Commission, Informing Communities: Sustaining Democracy in the Digital Age
While information has immense benefits and capabilities to improve our lives both individually and as a Nation, it also has dangers. Information about a person is potentially a means of influencing and controlling that person. Information challenges traditional sources of authority and institutions built on that authority. Experience, training, and education may be rendered useless by new information. Information can also erode responsibility: what was once considered a sin to be condemned or a crime to be punished may, with fuller knowledge, appear to some as an illness to be treated or a genetic defect to be repaired. This perception can lead to imposingly difficult questions about the limits on social engineering in the context of constitutional values of personal freedom and privacy.
It is for these reasons that information, and the electronic, chemical, biological, and social technologies that generate and give access to it, often affect constitutional relationships that we are accustomed to think of as political, economic, or legal in nature. Constitutional relationships deal with power, with limitations on power, and with the balance between them. Directly or indirectly, information often generates that power, informs its limitations, or affects their proper balance.
References[]
- ↑ Executive Order 13526, at §6.1(t).
- ↑ Auditing and Financial Management: Glossary of EDP Terminology, at 9.
- ↑ ETSI: Telecommunications Security; Lawful Interception (LI); Handover Interface for the Lawful Interception of Telecommunications Traffic, at 13 (2003) (full-text).
- ↑ DCID 6/3, Glossary, App. B.
- ↑ NATO Standardization Agency, NATO Glossary of Terms and Definitions 2-I-4 (2008) (full-text).
- ↑ Intelligence Warning Terminology, at 23.
- ↑ DCID 6/3, Glossary, App. B.
- ↑ Privacy and Civil Liberties Policy Development Guide and Implementation Templates, App. E, Glossary.
- ↑ U.S. Department of Defense, Joint Pub. 1–02: DOD Dictionary of Military and Associated Terms (Nov. 8, 2010, as amended through May 15, 2011) (full-text).
- ↑ 5 C.F.R. 1320.3(h).
- ↑ OMB Circular No. A-130, App. III, §6.j. See also Guidelines for Ensuring and Maximizing the Quality, Objectivity, Utility, and Integrity of Information Disseminated by Federal Agencies; Republication, at 8460.
- ↑ Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise, App. B, at 41.
- ↑ Designation and Sharing of Controlled Unclassified Information (CUI) §(3)(h).
See also[]
- Access to Information Act
- Actionable information
- Active information
- Adverse information
- Authentication capability information
- Background information
- Bibliographic information
- Biographical information
- Biometric information
- Classified information
- Content information
- Controlled information
- Controlled technical information
- Critical energy infrastructure information
- Critical information
- Data
- Defense information
- DoD critical infrastructure security information
- Emergency management information
- Execution information
- Fixity information
- Formatted information
- Genomic information
- Geospatial information
- Government information
- Government Information Locator Services
- Government Information Security Reform Act
- Homeland security information
- Informatics
- Information-based processes
- Information-based society
- Information-in-warfare
- Information acquisition
- Information Age
- Information Analysis and Infrastructure Protection Directorate
- Information Asset Register
- Information Assurance
- Information Assurance: A review of UK Government and industry initiatives
- Information Fair Trader Scheme
- Information Infrastructure Technology and Applications
- Information Network Security
- Information Object Security Program
- Information Operations
- Information Operations Condition
- Information Operations threat
- Information Security: Challenges in Using Biometrics
- Information Security Officer
- Information Sharing Environment
- Information Sharing Team
- Information Sharing and Analysis Center
- Information Sharing and Analysis Centers Council
- Information Society
- Information Society Commission
- Information Society Initiative
- Information strategy
- Information Systems Audit and Control Association
- Information Systems Related to Technology Transfer: A Report on Federal Technology Transfer in the United States
- Information Systems Security Line of Business
- Information Technology Agreement
- Information Technology Information Sharing and Analysis Center
- Information Technology Laboratory
- Information Technology Management Reform Act of 1996
- Information Technology Resources Board
- Information Technology Sector Baseline Risk Assessment
- Information Technology for the 21st Century
- Information Warfare
- Information Warfare Monitor
- Information access
- Information analysis
- Information and Communication Services Bill
- Information and Communication Technologies
- Information and Communications Technologies Policy Support Programme
- Information and communication technologies
- Information and communications infrastructure
- Information appliance
- Information asset
- Information assurance
- Information attack
- Information broker
- Information classification
- Information collection
- Information content provider
- Information costs
- Information device
- Information disclosure
- Information disclosure statement
- Information dissemination management
- Information dissemination product
- Information diving
- Information dominance
- Information economy
- Information encapsulation
- Information environment
- Information exchange
- Information exchange analysis
- Information extraction
- Information flow
- Information fusion
- Information gathering
- Information goods
- Information highway
- Information in identifiable form
- Information industry
- Information infrastructure
- Information interoperability
- Information law
- Information leak
- Information life cycle
- Information literacy
- Information management
- Information network
- Information object
- Information operations
- Information overload
- Information owner
- Information policy
- Information portal
- Information practice statements
- Information preservation
- Information privacy
- Information processing
- Information processing outsourcing
- Information processing system
- Information product
- Information provenance
- Information quality
- Information reseller
- Information resource management
- Information resources
- Information resources management
- Information retrieval
- Information science
- Information security
- Information security assessment
- Information security incident
- Information security laws
- Information security management
- Information security policy
- Information service
- Information sharing
- Information society
- Information solutions provider
- Information steward
- Information superhighway
- Information superiority
- Information system
- Information system-related security risk
- Information system component
- Information system general controls
- Information system owner
- Information system security officer
- Information systems security
- Information systems security officer
- Information technology
- Information technology architecture
- Information technology infrastructure
- Information technology law
- Information technology sector
- Information technology security
- Information technology system
- Information transfer
- Information transfer path
- Information type
- Information warfare
- Informational privacy
- Law enforcement information
- Logistical information
- Mission-critical information
- Narrative information
- National security information
- Operational information
- Operational vulnerability information
- Opposing information
- Performance information
- Police information
- Presence information
- Prospect information
- Protected critical infrastructure information
- Protected information
- Provenance information
- Purchase information
- Reference information
- Restricted information
- Security information
- Structure information
- Substantial issue information
- Surveillance information
- Terrorism information
- Topographical information
- Weapons of Mass Destruction Information
This page uses Creative Commons Licensed content from Wikipedia (view authors). |