This chapter describes the features and benefits of the distributed environment and how the proliferation of introduced technology has led to a greater need to establish an information security plan. It presents a model for securing data, taking into consideration the special needs of this environment. The information security model described in the chapter involves a three-step process: Classifying the data, Determining the organization’s security needs, and Selecting the appropriate security techniques. Avoidance techniques pertain to internal threats, both intentional and accidental, and external threats. Internal, intentional threats come from employees who, for professional or personal reasons, try to defraud the organization by stealing, disclosing, or destroying data in Distributed database systems. The tolerance approach allows potential violators to access data, but the data is made unmanipulable or unintelligible, thus preventing the likelihood of data abuse. Data in a distributed database lies in one of its two states, in place or en route.