Preview

Final Project

Better Essays
Open Document
Open Document
4129 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Final Project
Introduction
An effective IT Security policy protects the organization against possible threats to the infrastructure and data that the organization has. It will provide and maintain its ability to provide confidentiality, integrity, availability, and security of the client’s data within the organization’s environment.
Overview
The IT Security and Compliance policy for LenderLive Network Inc. will detail the policies, procedures, and guidelines that the organization will adhere to, to ensure compliance of the Graham-Leach-Bliley Act (GLBA) and Federal Trade Commission’s Safeguards Rule. It describes the elements to which the organization intends to ensure the security and confidentiality of covered records, protect against any anticipated threats or hazards to the security of the records, and protect against unauthorized access or use of records or information in ways that could result in harm to clients.
Purpose
The purpose of this policy is to define the policies, procedures, and guidelines that will be adhered to and enforced within LenderLive Network Inc.
Risk Analysis
Overview
The risk analysis will use the Strengths, Weaknesses, Opportunities and Threats (SWOT) format to analyze the risks that could face the organization.
Purpose
The purpose of the risk analysis is providing a detailed analysis of the possible threats and risks associated with the organization and the controls needed to mitigate these threats.
Risks that LenderLive Network considers on a normal basis are users leaving computers unsecure. When they walk away, not using proper storage techniques with their passwords i.e. storing them in plain sight. Users of LenderLive Network also have issues with leaving client personal information in open view when they leave their desks or when they leave for the night. Tailgating, entering into the office area without swiping the secured badge is another issue that many employees of LenderLive Network have been accused of and guilty of.



Cited: Anton, A. (2012). Lenderlive: Due Diligence Manual. Glendale. Board, P. C. (2008, October). PCI Compliance Guide. Congress, 1. (1999, November 12). Gramm-Leach-Bliley Act. Montagu, A. (2001). The Free Dictionary. Retrieved from legal-dictionary,freedictionary.com: http://legal-dictionary.thefreedictionary.com/Intellectual+Property

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -Policy will be implemented to document all security policies and operation policy to secure cardholder data that will be stored in company database. (System/Application Domain & LAN Domain & Remote Access Domain)…

    • 565 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mcbride Finacial Security

    • 601 Words
    • 2 Pages

    This document is to describe the Information Security requirements of Online Application Services and Application Service Providers that engage in business with McBride Financial Services. This policy applies to any use of Online Loan Applications (OLA) and any outsourcing to Application Service Providers (ASP) by McBride Financial Services, independent of where hosted.…

    • 601 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Bsa 310 Week 2

    • 653 Words
    • 3 Pages

    IT security policies need to address the customers concerns in regards to handling their personal information with a third…

    • 653 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    The purpose of this risk assessment is to evaluate the adequacy of the Global Finance, Inc. security and network. This risk assessment provides a structured qualitative assessment of the operational environment. It addresses sensitivity, threats, vulnerabilities, risks and safeguards. The assessment recommends cost effective safeguards to mitigate threats and associated exploitable vulnerabilities. Safeguards are security features and controls that, when added to or included…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    First World Bank Savings and Loan (FWBSL) needs to consider the increased revenue and cost that will be present if they decide to offer secure services to their clients. With them expecting to have over $100,000,000 a year for online credit cards and loan applications together with other banking services, they are also expected to provide this service while paying close attention to the three security priorities which are: confidentiality, integrity, and availability. Customers expect FWBSL to be diligent when it comes to protecting their accounts and Nonpublic Personal Information. If something were to go wrong they could lose credibility with their current and potential…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Mcdonald's $1.00 Menu

    • 356 Words
    • 2 Pages

    SWOT (strengths, weaknesses, opportunities, threats) analysis is a tool that should allow us to understand better the impact of this decision and to anticipate the future direction of their business.…

    • 356 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A tool that identifies the strengths, weaknesses, opportunities and threats of a business. SWOT is a straightforward model that assesses what a business can and cannot do as well as its potential opportunities and threats. The method of SWOT analysis is to…

    • 709 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Final Project

    • 2652 Words
    • 8 Pages

    At the beginning of the course, Dr. Higley provided the following quote, “Vision is a picture of the future that stirs passion in you (and those you lead).” This motto has remind in the mind of the student throughout the course. Beginning in week one and continuing, the students made an attempt to better understand biblical mission and the four current church structures. This paper will explain biblical foundations for ministry and provide an evaluation for the four current church structures. The student will then create a strategic plan for implementing an effective church structure for developing disciples. Habakkuk 2:2 states, “And the Lord answered me: “Write the vision, make it plain on tablets, so he may run who reads it.”…

    • 2652 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Final Project

    • 936 Words
    • 3 Pages

    In this essay I will be comparing two well-known paintings, who’s styles were both born of the French Revolution: Resting Girl (Marie-Louise O’Murphy)/Reclining Girl by François Boucher (1751) and Grande Odalisque by Jean Auguste Dominique Ingres.…

    • 936 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Areas similar to standards discussed Overview of the corporate philosophy on security Documents the Introduction and Purpose of the Information security policy of Chicago It provides a reasonable framework that helps the reader to understand the intent of the document…

    • 2909 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 37

    • 1183 Words
    • 4 Pages

    1.2 + 1.3: We have regulations and guidelines with policies and procedures to follow to protect the client for example hear are just a view ways in which we must do this:…

    • 1183 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Final Project

    • 7850 Words
    • 32 Pages

    For this project, I am placing myself in a hypothetical context as a staff pastoral counselor at my home church in Valley City, ND, serving a congregation of approximately 200. I have chosen as my overarching goal for life to serve others in the capacity for which the Lord has gifted me and prepared me to counsel and minister to them. 1 Peter 4:9 tells us that, “Each of you should use whatever gift you have received to serve others, as faithful stewards of God’s grace in its various forms.” I believe that serving in a counseling role is my gift, and that it is my calling to use that gift to serve others, and in doing so, to obey God.…

    • 7850 Words
    • 32 Pages
    Good Essays
  • Satisfactory Essays

    The U.S. Federal and State compliance laws in regards to data protection affect all financial institutions in that non-compliance will result in fines and penalties. ABS Financial Solutions handles sensitive data for many credit unions and without regulations governing data security there would be no repercussions when private information is mishandled, lost or stolen. ABS understands their responsibility for protecting their client’s data and the threat of the retribution both federal and civil for non-compliance ensures they take appropriate security precautions.…

    • 407 Words
    • 1 Page
    Satisfactory Essays