Zed Bank Information Security Policy Analysis

Good Essays
ABSTRACT.
The objective posed in every information security policy is that of data protection through a thorough definition of procedures, practices and guidelines for the practical configuration and information security management in the entire corporate environment. The policy therefore defines the organization’s orientation in regard to philosophy and the actual requirements for securing the information assets. Again, the policy outlines its applicability to all stakeholders, the processes and the environments subject thereto.
The consequences for failure to conform to the express terms of the policy must be clearly stated. The benefits to the organization are derived from a successful information security policy. The policy must therefore be
…show more content…
The name ‘ZED’ bank therefore have been arbitrary chosen for the purposes of this policy document only

ZED BANK INFORMATION SECURITY POLICY
1. POLICY:
The policy of ZED bank on information security as deemed in this writ, whether in the oral, written, printed or in any other form including electronic recording, shall be protected from unauthorized modification, disclosure or destruction whether accidental or intentional acts of man. This protection shall include the stipulated level of security over the software and the machinery utilized in the actual course of processing, storage and transmission of such information.
2. SCOPE:
The scope of information security includes the protection of the confidentiality, integrity and availability of information.
The framework for managing information security in this policy applies to all ZED bank entities and workers, and other Involved Persons and all Involved Systems throughout ZED bank as defined below in “INFORMATION SECURITY DEFINITIONS”.
This policy and all standards apply to all protected banking information and other classes of protected information in any form as defined below in “INFORMATION

You May Also Find These Documents Helpful

  • Powerful Essays

    Information Security Policy

    • 2658 Words
    • 11 Pages

    Information Security Policies are a very important part of a company’s protection; these policies are put in place to protect the company and well as the clients. It is important to maintain a constant watch over all security departments daily to ensure that everything is in working order. The policy below is a great way to keep track of the steps needed to protect your company and clients. Romana Aftab 338 deare street 337-256-5555 337-256-5556 Alfred Beals Jr 2011 Information Security…

    • 2658 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    Appendix B INFORMATION SECURITY POLICY Table of Contents 1. Executive Summary 1 2. Introduction 2 3. Disaster Recovery Plan 5 3.1. Key elements of the Disaster Recovery Plan 5 3.2. Disaster Recovery Test Plan 6 4. Physical Security Policy 8 4.1. Security of the facilities 8 4.1.1. Physical entry controls 8 4.1.2. Security offices, rooms and facilities 8 4.1.3. Isolated delivery and loading areas 9 4.2. Security of the information systems 9 4.2.1. Workplace protection 9 4.2.2. Unused…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Better Essays

    Role of Information Security Policy The Role of Information Security Policy The failure of organizations to implement a comprehensive and robust information security program can mean the untimely demise for some and costly setbacks for others. At the heart of information security is security policy. Without security policy there can be no security program. Without people, security policies would not exist. They would not be written, implemented, and enforced. Security policies and the adoption…

    • 1099 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Introduction Student Name: Rodrick J. Maynard Axia College IT/244 Intro to IT Security Instructor’s Name: Ridwan Bari Date: May 1, 2011 Introduction WAN that is short for Wide Area Network this type of connectivity is a critical and key part for businesses especially ones that use voice and video over IP and the centralization of applications. It allows companies to use real-time traffic based applications to e-mail messages and inter-office voice communications…

    • 608 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    appropriate security for all Information Technology data, equipment, and processes in its domain of ownership and control. This obligation is shared, to varying degrees, by every member of the company. This document will: 1. Enumerate the elements that constitute IT security. 2. Explain the need for IT security. 3. Specify the various categories of IT data, equipment, and processes subject to this policy. 4. Indicate, in broad terms, the IT security responsibilities…

    • 1111 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Critique of current Chicago information security policy Enterprise Information Security Policy (EISP) Areas similar to standards discussed Overview of the corporate philosophy on security Documents the Introduction and Purpose of the Information security policy of Chicago It provides a reasonable framework that helps the reader to understand the intent of the document Overview  The City of Chicago (City) intends to manage its information technology and information assets to maximize their efficient…

    • 2909 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    and Policies of Information Security Computer networks have allowed activity that none dreamed possible hundreds of years ago; however, millions of attempts to compromise the security of computer systems are made on a daily basis. Knowing and using the 12 principles of information security allows security professionals to mitigate most threats to data security. By understanding the different types of security policies, effective policies can be put into place that ensure better information security…

    • 841 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Bank Security

    • 420 Words
    • 2 Pages

    Security of Bank Teller Operations Who is a Bank Teller? A teller is an employee of a bank[->0] who deals directly with most customers. In some places, this employee is known as a cashier. What are we protecting? Customer Funds ( CASH) 1. Teller Cash 2. Vault Cash 3. Cash Shipments Bank teller is taking care of these honest customers and at the same time distinguish the difference between the customer and the robber.) A welded stainless steel deal tray makes it possible for tellers…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Security

    • 2188 Words
    • 9 Pages

    Characteristics of Information Security; The extended characteristics of information security as proposed by (Whitman, M.E. & Mattord, H.J, 2010) are planning, policy, programs, protection and project management. Being highly respectable experts in the field of information technology, specifically information systems and security, transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained. Planning; The planning stage in Information Security (InfoSec)…

    • 2188 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Information Security

    • 813 Words
    • 4 Pages

    information security. 1. What do you understand by information security? Explain the CIA triad. Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or…

    • 813 Words
    • 4 Pages
    Good Essays