Preview

Unit 2 Discussion 1 - Risk Mitigation Policy

Satisfactory Essays
Open Document
Open Document
286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Discussion 1 - Risk Mitigation Policy
Nayana Communications Risk Mitigation Policy 1.0 Purpose To empower the Nayana Communication Information Security policy a periodic Information Security Risk Mitigations (RMs) must be performed to determining areas of vulnerability, and to initiate appropriate remediation. 2.0 Scope Risk Mitigations can be conducted on any entity within Nayana Communications or any outside entity that has signed a Third Party Agreement with Nayana Communications. RM can be conducted on any information system, to include applications, servers, and networks, and any process or procedure by which these systems are administered and/or maintained. 3.0 Policy The execution, development and implementation of remediation programs are the joint responsibility of Information security and the department responsible for the systems areas being assessed. Employees are expected to cooperate fully with any RM being conducted on systems for which they are held accountable. Employees are further expected to work with the Information security Risk Mitigation Team in the development of a remediation plan. 4.0 Risk Mitigation Process For additional information, go to the Risk Assessment Process.

1

5.0 Enforcement Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. 6.0 Definitions Terms Entity Definitions Any business unit, department, group, or third party, internal or external to Nayana Communications, responsible for maintaining Nayana Communications assets. Risk Those factors that could affect confidentiality, availability, and integrity of Nayana Communications's key information assets and systems. Information security is responsible for ensuring the integrity, confidentiality, and availability of critical information and computing assets, while minimizing the impact of security procedures and policies upon business productivity.

7.0 Revision History Revision Number 1 Date Details

01/12/2013 Initial

2

You May Also Find These Documents Helpful

  • Powerful Essays

    High: There are major disruptions if the business lost more than a week, which affects parts of the…

    • 1105 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Just as with other countries, Canada experiences natural disasters that are disruptive to both individual and corporate life. With the establishment of a call-center presence in the country, this naturally occurring phenomenon must be considered.…

    • 2452 Words
    • 10 Pages
    Good Essays
  • Good Essays

    * Remote access must be secure and strictly controlled. Enforcement of control will be via password authentication or private/public keys with strong pass-phrases.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The data and recommendations in the BCP are well supported. However, the timeline set forth in the BCP is the principal variable that may require modifications to the document. The timeline of each action item in the implementation plan is identified as an appropriate constraint. However, this constraint is predicated off time estimations. Although the project team has endeavored to provide accurate estimations, State Farm should not view them as precise, since there is no existing process for the international relocation of sensitive and customer data. These estimates are predicated off the domestic…

    • 424 Words
    • 2 Pages
    Good Essays
  • Good Essays

    It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:…

    • 546 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Risk Assessment P3 M2 D1

    • 2163 Words
    • 6 Pages

    Children should be told to wash their hands after playing with the animals in the mould area to prevent mould being spread around the room.…

    • 2163 Words
    • 6 Pages
    Better Essays
  • Good Essays

    NT2580

    • 940 Words
    • 4 Pages

    * Do not create unnecessary business risk to the company by misuse of the network, internet, or email services…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    I had my hearing; they told me I had a 15,000 dollar bond. The judge asked me if I wanted to be appointed a lawyer or wanted to hire one. I told the judge I have no money, my mom barely gets buy and I would like to have a free one. He told me in my current situation that if I get bonded out that I could still get a free lawyer to help me with my case. Hope my mom can get me out today.…

    • 1071 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Diploma Level 3 Hsc 38

    • 299 Words
    • 2 Pages

    Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental lost or destruction of, or damage to personal data.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    The Integrated Distributors Incorporated is a publically traded company that is facing many challenges. The company’s Information technology infrastructure has been ignored and many of its operating locations are running outdated hardware and software, which greatly increases the risk to the network in relations to confidentiality, integrity, and availability. Because of the outdated hardware and software, the company suffered some network compromises through their JV internet site and it led to disclosures of sensitive and strategic information.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Policy Process Part 1

    • 1440 Words
    • 6 Pages

    Polices are reviewed and considered everyday with the intention to solve problems and improve the quality of life. The policies implemented to improve the American health care system affect each and every person, so it is extremely important that policies are carefully considered before they are implemented. The following paper will address how a topic eventually becomes a policy and will include the formulation stage, the legislative stage, and finally the implementation stage. Before a policy is even established, it goes through several stages which include: agenda building, formulation, adoption, implementation, evaluation and termination. These steps are extremely important and need to be carefully carried out during the policy process to ensure that the policy will indeed solve the problem at hand and to also improve the quality of life for all citizens.…

    • 1440 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Policy Process Part I

    • 1296 Words
    • 6 Pages

    Women’s health care needs will always maintain a policy status as technology and changes in medicine or services occur. As long as women continue to dominate stakeholder status, reforms of programs are very much in need so that every women regardless of status can receive quality care without high cost, restrictions, or refusals for pre-existing conditions “because being a women is not a pre-existing condition” (KaiserEDU.org, 2012a, p. 1). So to understand the processes of how policies affect women’s health, the following explanation of the three stages will provide insight into how a topic might become a policy or fail to become a policy that affects women’s health care.…

    • 1296 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Risk Management Success

    • 1462 Words
    • 5 Pages

    The paper is intended to inform the reader of the steps that a risk management program should take in order to ensure that safety and security are upheld. The security and protection of information is more difficult than ever before due to the expanse of technology that is used in the world. Information can be hacked in to and utilized for fraudulent purposes. Personal information of random populations is sought by convicted felons and illegal organizations for the purpose of identity theft and financial gain. The recent inception of identity theft pays tribute to the realization that modern technology truly presents higher risk in terms of security breaches. Alongside the need for security of information is the protection of safety of both staff and patients alike. This aspect of risk management holds a great amount of weight in terms of evaluating the success of a program, as adverse events can cost an organization their accreditation and often times their funding and viability can be negatively affected. The overall goal for this piece is to discuss risk managements involvement in the handling of infectious waste and the protection of private health information by assessing the role of a risk manager, the objectives set forth for a risk management team, and by reviewing the training provided to employees.…

    • 1462 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The American Health Care system needs to be constantly improved to keep up with the demands of America’s health care system. In order for the American Health Care system to improve policies must be constantly reviewed. Congress still plays a powerful role in public policy making (Morone, Litman, & Robins, 2008). A health care policy is put in place to reach a desired health outcome, which will hopefully have a meaningful effect on people. People in position of authority advocates for a new policy for the group they have special interest in helping. The Health care system is formed by the health care policy making process (Abood, 2007). There are public, institutional, and business policies related to health care developed by hospitals, accrediting organizations, or managed care organizations (Abood, 2007). A policy is implemented to improve the health among people in the United States. Some policies take longer than others to be implemented if they are a big change, controversial, or costly (Abood, 2007). There are three phases in the policy making process. Those phases and the complete process of how a policy that will help improve access to care among women in the United States living with the Human Immunodeficiency Virus (HIV) or Acquired Immune Deficiency Syndrome (AIDS) becomes a policy will be discussed. Improving access to care among women is important because women living with HIV/AIDS face unique challenges (Kaiser, 2011). Trends show that women are more prone to heterosexual transmission of HIV and women make up a growing share of new AIDS cases in the United States (Kaiser, 2011). A policy that will benefit women and girls living with HIV/AIDS is needed to help them have access to care and treatment. Preventing new infections among women and girls is also an important issue that should be addressed for the new policy. There are many issues in America and knowing why Congress will react or not react to certain issues is not…

    • 1428 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Mr. X and Mr.B are involved in a motor accident. Both parties believe that the other is at fault for the accident occurring. Mr.B believes that Mr.X is responsible for the damage to his motor vehicle and Mr.X believes that Mr.B is responsible for the damage to his motor vehicle. Fortunately for Mr.B, insurance was taken out for his motor vehicle through the Mr.B Family Trust (hereinafter referred to as the B family trust). In other words the insurance contract for this motor vehicle is with the B Family Trust and not in the name of Mr.B himself. However with…

    • 2498 Words
    • 10 Pages
    Powerful Essays