Preview

Sample Information Security Policy

Powerful Essays
Open Document
Open Document
1111 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sample Information Security Policy
Preamble DooDads4Sale.com acknowledges an obligation to ensure appropriate security for all Information Technology data, equipment, and processes in its domain of ownership and control. This obligation is shared, to varying degrees, by every member of the company. This document will: 1. Enumerate the elements that constitute IT security. 2. Explain the need for IT security. 3. Specify the various categories of IT data, equipment, and processes subject to this policy. 4. Indicate, in broad terms, the IT security responsibilities of the various roles in which each member of the university may function. 5. Indicate appropriate levels of security through standards and guidelines.

Scope of IT Security 1. Definition of Security. Security can be defined as "the state of being free from unacceptable risk". The risk concerns the following categories of losses: • Confidentiality of Information. • Integrity of data. • Assets. • Efficient and Appropriate Use. • System Availability. Confidentiality refers to the privacy of personal or corporate information. This includes issues of copyright.

Integrity refers to the accuracy of data. Loss of data integrity may be gross and evident, as when a computer disc fails, or subtle, as when a character in a file is altered.

The assets that must be protected include: • Computer and Peripheral Equipment. • Communications Equipment. • Computing and Communications Premises. • Power, Water, Environmental Control, and Communications utilities. • Supplies and Data Storage Media. • System Computer Programs and Documentation. • Application Computer Programs and Documentation. • Information.

Efficient and Appropriate Use ensures that the company’s IT resources are used for the purposes for which they were intended, in a manner that does not

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. In computing, e-Business, and information security, it is necessary to ensure that the data, transactions, communications or documents (electronic or physical) are genuine. It is also important for authenticity to validate that both parties involved are who they claim they…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Better Essays

    1.3 - Explain the purpose of legal and organizational requirements for the security and confidentiality of information…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    2. General access to the Internet for recreational use by immediate household members through the Richman Investment Network on personal computers is permitted for employees that have flat-rate services. The Richman Investment employee is responsible to ensure the family member does not violate any Richman Investment policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman Investment employee bears responsibility for the consequences should the access is…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    7. Communications and operations management: Incorporates operational procedures and responsibilities, third-party service delivery management, systems palnning and acceptance, protection against malicious and mobile code, backup, network security management, media handling, exchange of information, electronic commerce services and monitoring…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    Describe potential risks to the information and the related vulnerabilities within the organization. Identify the forces that drive each threat and the related vulnerabilities.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    gap analysis. You should include tasks, resources, cost estimates, and time estimates in the project plan.…

    • 313 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    1)Data protection: Ensure all information is stored in a secure place and no information is given out if unsure.…

    • 1527 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Final Project

    • 4129 Words
    • 13 Pages

    An effective IT Security policy protects the organization against possible threats to the infrastructure and data that the organization has. It will provide and maintain its ability to provide confidentiality, integrity, availability, and security of the client’s data within the organization’s environment.…

    • 4129 Words
    • 13 Pages
    Better Essays
  • Good Essays

    Finance Questions

    • 600 Words
    • 2 Pages

    7. For each of the seven domains of a typical IT infrastructure, what process or procedures would you perform to obtain information about security controls and safeguards?…

    • 600 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Areas similar to standards discussed Overview of the corporate philosophy on security Documents the Introduction and Purpose of the Information security policy of Chicago It provides a reasonable framework that helps the reader to understand the intent of the document…

    • 2909 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 1 2 and 3

    • 1651 Words
    • 1 Page

    4.1 Confidentiality means not sharing information about people without their knowledge and agreement, and making sure that written and electronic information cannot be accessed by people who have no reason to see it.…

    • 1651 Words
    • 1 Page
    Good Essays