Preview

Security Awareness Policy

Powerful Essays
Open Document
Open Document
1733 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Awareness Policy
Security Awareness Policy
(statement 1)
The Information Security (IS) team is responsible for promoting on­going security awareness to all information system users. A Security Awareness program must exist to establish formal methods by which secure practices are communicated throughout the corporation. Security guidance must exist in the form of formal written policies and procedures that define the principles of secure information system use and the responsibility of users to follow them.
Security awareness articles, posters, and bulletins should be periodically created and distributed throughout the corporation to educate employees about new and existing threats to security and how to cope with them. All employees are responsible for promptly reporting to their management and Information
Systems (IS) management any suspected insecure conditions or security violations they encounter. All employees must be made aware of their security responsibilities on their first day of employment as part of the new­hire orientation program. All employees must comply with IS security policies by signing a compliance agreement that is retained in their personnel file. IS Security policies and procedures must remain current and readily available (e.g., via the intranet site) for Information System users to review and understand them. Information
Systems (IS) management must ensure that the terms and conditions of authorized system access are clearly communicated to potential users of those systems before access is granted. A formal process must exist to document that appropriate management was aware of and approved all access and privileges granted to corporate system users.

Justification:
Organizational security awareness is an essential part of the corporate security posture.
Information is one of the most valuable assets owned by the corporation, and securing information is the responsibility of every employee. Many security breaches



References: HIPAA,. (2014). Retrieved 19 November 2014, from  http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityrulepdf.pdf    PCI DSS,. (2014). Retrieved 19 November 2014, from  PCI DSS,. (2014). Retrieved 19 November 2014, from  https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf    NIST,. (2014). Retrieved 19 November 2014, from  NIST,. (2014). Retrieved 19 November 2014, from  http://csrc.nist.gov/publications/nistpubs/800­92/SP800­92.pdf    NIST,. (2014). Retrieved 19 November 2014, from  PCI DSS,. (2014). Retrieved 19 November 2014, from  https://www.pcisecuritystandards.org/documents/PCI_DSS_v3.pdf    ISO,. (2005). ISO/IEC 27002:2005(E), Information technology — Security techniques — Code    ISO,. (2013). ISO/IEC FDIS 27001:2013(E), Information technology — Security techniques —  Information security management systems — Requirements. (2013). Retrieved from  http://www.iso.org/    Qcode.co.uk,. (2014). PCI DSS Requirement 8: Part 3 – User & Password Policy « Qcode    Software, S. (2014). HIPAA Compliance Checklist for Password Security.    Webdrive.com,. (2014). Terminology. Retrieved 24 November 2014, from  Whaley, A. (2012). Are Your Passwords Secure AND HIPAA Compliant?. Manage My  Practice. Retrieved 19 November 2014, from 

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Bsa 310 Week 2

    • 653 Words
    • 3 Pages

    IT security policies need to address the customers concerns in regards to handling their personal information with a third…

    • 653 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Project part 6

    • 406 Words
    • 2 Pages

    PCI DSS stands for Payment Card Industry Data Security Standard. PCI DSS originally began as five different programs: Visa, MasterCard, American Express, Discover and JCB data security programs. Each company creates an additional level of protection for card issuers by ensuring that merchants meet minimum levels of security when they store, process and transmit cardholder data. PCI DSS specifies 12 requirements for compliance, organized into six logically related groups called control objectives. Each version of PCI DSS has divided these 12 requirements into a number of sub-requirements differently, but the 12 high level requirements have not changed since the inception standard. The control objectives are Build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks and maintain an information security policy. The requirements for compliance are, install and maintain a firewall configuration to protect card holder data, do not use vendor-supplied defaults for system passwords and other security parameters, protect stored cardholder data, encrypt transmission of cardholder data across open public networks, use and regularly update anti-virus software on all systems commonly affected by malware, develop and maintain secure systems and applications, restrict access to cardholder data by business need-to-know, assign a unique ID to each person with computer access, restrict…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Explain The Purpose of Legal And Organisational Requirements For The Security And Confidentiality Of Information…

    • 1346 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    ISA 650 Final Exam Paper

    • 4435 Words
    • 18 Pages

    73. Requires the creation of computer security plans, and the appropriate training of system users or…

    • 4435 Words
    • 18 Pages
    Satisfactory Essays
  • Good Essays

    Explain the purpose of legal and organizational requirements for the security and confidentiality of information:…

    • 777 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    If a breach occurs a reminder memo should be sent out companywide to refresh the employees of the policies and procedure that should be followed. The annual trainings are to be required computer modules that employees must do on their own time by a set date each year, once the employee completes this module a notification will be sent to his/her manager that it has been completed. If there are changes that occur, a memo should be delivered to all employees outlining the change as well as providing them with an outlet to ask any questions they may have regarding the changes. Any employee that is known to have compromised PHI or any company confidential information will be reprimanded and depending on the severity of the breach can be fired and even…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    3.1. Explain how to support others to understand the need for secure handling of information…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Security Monitoring

    • 867 Words
    • 4 Pages

    In this paper we will be discussing security monitoring techniques that can and should be used within an organization to help put together an solid action plan when there is an risk identified. For any business or organization to ensure that they are conducting quality business to their customers as well as achieving their business goals should consider risk management as an huge part of their organization.…

    • 867 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Guidence and Couselling

    • 1533 Words
    • 7 Pages

    The object of security is to protect valuable or sensitive organizational information while making it readily available. Attackers trying to harm a system or disrupt normal business operations exploit vulnerabilities by using various techniques, methods, and tools. System administrators need to understand the various aspects of security to develop measures and policies to protect assets and limit their vulnerabilities.…

    • 1533 Words
    • 7 Pages
    Good Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays

Related Topics