StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Security Policy: Development Guide for Large and Small Companies - Case Study Example

Cite this document
Summary
A paper "Information Security Policy: Development Guide for Large and Small Companies" outlines that the government and organizations should establish appropriate policies. These include a number of set procedures or rules concerning information which have to be observed by all staff…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Information Security Policy: Development Guide for Large and Small Companies
Read Text Preview

Extract of sample "Information Security Policy: Development Guide for Large and Small Companies"

Information Security Policy: Development Guide for Large and Small CompaniesInformation security laws and practices involve the ways of ensuring that organizations protect and manages their information, that is, in a confidential and safe manner, in order to prevent it from getting lost or being distorted for the purpose of achieving laid goals. The government, organizations and businesses should be careful in the way they disseminate or disclose information. These include practices such as preventing any unauthorized personnel from such delicate sources, use or alteration of information.

Businesses, the government and organizations should establish appropriate policies. These include a number of set procedures or rules concerning information which have to be observed by all staff in order to ensure that organizational information remain safe and always available for use .(Microsoft, 2009). This therefore limits the staff on the extent to which they can go to reach certain information in organizations. They also receive only the relevant information and by this doing, the entire organization’s information is made available, confidential and of adequate data integrity.

(Danchev, 2003)Policies are in two categories when it comes to information security in any organization. Organizational policies and government policies. The organizational policies are made to set protocol in organizations while the government policies rule those in government offices and are normally set by the state. (British Columbia, 2011). For instance, organizational policies must protect the entire staff and their information resources or tools, set the ethical standards expected of all employees and also set due acts of punishment for all the violators of the set policies so that they can follow these policies to the latter.

(Canavan and Diver, 2007).Regulations are the second set of rules in an organization or government. Their purpose in these institutions is to prohibit allows something to take place. By this, they therefore reduce occurrences of any risks when it comes to information security as opposed to its loss or distortion. (Danchev, 2003). Laws constitute the last category of rules. They can either be public laws or private laws. Private law works between the organization and the employee while public laws rule the entire government, its people, and all the employees in an organization.

(Whitman and Mattord, 2007).Legal environment comprise of the relevant polices; laws and regulations have been found to have a great impact in organizations. They much influence attributes such as integrity, availability of information and information systems and confidentiality in many organizations in the following ways.Data integrity in an organization means that the information is correct and by this doing, organizations can be accurate and consistent in the way they serve their customers or clients.

Secondly, minimum errors in information will be experienced if governments and organizations come up with laws that put much enforce integrity of data.Government and other organizations must in a way design on ways of ensuring confidentiality in their information in other words preventing unnecessary disclosure of information .This mostly applies to the information and technology devices they use or by word of mouth, print and e-mailing the information to a second party. For instance, any unauthorized access to such devices and information or data should be prohibited for maximum information security.

Any information about a business’ customers, the organization itself or government must never be spread out because it may in one way or another lead to bad reputation from the public and such organizations or businesses may experience massive losses in customers thus leading to low profits.Availability of useful information in an organization or government enables due attainment of the set goals because such kept records act as sources of references and that the information can be accessible when needed.

If this is enabled, then there is no doubt that these institutions can develop and become competitive with time. In enhancing availability of information, organizations are advised to use antivirus software which scans the stored data in computers. (Evans, 2006).References1. Canavan, C. & Diver, D. (2007). Information Security Policy – A Development Guide for Large and Small Companies. SANS Institute , SI: SANS Institute publishers2. Columbia, C. (2011). Information Security Policy. British Columbia, BC: Capital press3.

Danchev, D. (2003). Building and Implementing a Successful Information Security Policy. Washington, DC: New media4. Evans, E. (2006). Securing a Web Site. United States of America, U.S.A: McKay press5. Microsoft, M. (2009). Software Use Policy. New York, NY: Microsoft publishers6. Whitman, W. & Mattord, M. (2007). Legal, Ethical, and Professional Issues in Information Security.Washington, DC: New media

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Policy: Development Guide for Large and Small Case Study - 5”, n.d.)
Information Security Policy: Development Guide for Large and Small Case Study - 5. Retrieved from https://studentshare.org/information-technology/1623884-law-and-policy-case-study
(Information Security Policy: Development Guide for Large and Small Case Study - 5)
Information Security Policy: Development Guide for Large and Small Case Study - 5. https://studentshare.org/information-technology/1623884-law-and-policy-case-study.
“Information Security Policy: Development Guide for Large and Small Case Study - 5”, n.d. https://studentshare.org/information-technology/1623884-law-and-policy-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Security Policy: Development Guide for Large and Small Companies

Federal Contracts

The other parties who are bound to receive assistance are companies whose corporate policy is to promote, develop and implement subcontracting opportunities for the sector of socioeconomic.... It is also possible for such companies to combine and form one large contract as highlighted in the Mentor Protege Program.... Federal Contracts Name Institution Introduction As much as the federal and state agencies play an essential role in supporting small entrepreneurs to compete in the global market, they do not give grants for starting businesses....
3 Pages (750 words) Essay

Job Seeker Information Compromised

This paper ''Job Seeker Information Compromised'' tells that In August 2007, there was a major security alert at the online job website Monster.... As this hacking case proves, however, the security aspect of the site has left a lot to be desired.... However, nothing in internet security is foolproof as will be seen in this report.... The fraud in operation was typical, identity theft, as opposed to a lapse of security on the Monster....
9 Pages (2250 words) Case Study

E-Commerce Application for Computer Hardware Sale

Thomas asserts that, The main stages in the development of a good interface involves conducting a detailed requirement analysis which aids in establishing the goals to be achieved by the website, outlining the site design and architecture details and performing a task analysis, prototyping, creating, testing and launching the site.... Newmann and Lamming, (pg 163) asserts that, conceptual design assist the user understand the system through the development of the user model....
9 Pages (2250 words) Essay

E-Business security in your organisation

here are several companies like Verisign, Oracle, IBM, and a host of other for-profit and not-for-profit institutions known by their acronyms: SEI, IETF, NIST, W3C, SAI, ISACA.... he Europe-based International Organization of Standards is known for its ISO standards, the more famous of which are the ISO 9000 series used by companies to document their total quality management programs (Arnold 15).... sers normally tested the system by transferring small amounts, and when it worked they began moving bigger amounts of money....
12 Pages (3000 words) Essay

Surveillance Technologies

All the phone and cable companies that provide one with access to the internet should route the traffic in a neutral way with no biases in terms of speeding up or slowing down applications.... The president remains committed to providers and the small voices.... large files and encrypted files take long to transmit while all have the same access to the network.... Decisions of the internet have a profound effect on web development....
6 Pages (1500 words) Essay

Developing Information Systems to Increase Productivity, Efficiency, and Profit

It has been observed that both medium and large organizations cannot operate for more than 24 hours without modern technology support (Tutor Guidance, para.... The paper "Developing information Systems to Increase Productivity, Efficiency, and Profit" states that the technological world is not static and neither is the market environment.... However, with the modern technological developments that have been recorded in the past few decades, organizations have found it impossible to operate without information technology support....
9 Pages (2250 words) Essay

Information Security: Principles and Practice

According to Marks (2009), knowing all kinds of threats that you are vulnerable to in regard to the world of IT is significant in the establishment of a security policy.... … The paper "information security: Principles and Practice" is a great example of an assignment on information technology.... The paper "information security: Principles and Practice" is a great example of an assignment on information technology.... A project must have explicitly defined requirements that are boldly written in a requirement document so as to act as a guide....
6 Pages (1500 words) Assignment

Information and Communication Technology Management and Information Technology

To avoid this it is requisite to recruit an overall project manager who will be in charge of the system development.... Software development is an intensive knowledge field that encompasses human and social factors.... Modeling is a critical requirement during the system development process.... Part BThe most important aspect in the development of information systems and their security is strategic planning and decision making (Whitman and Mattord, 2010, p....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us