StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Create a Security Policy - Essay Example

Cite this document
Summary
This is a security policy that responds to the financial services of McBride Company by following the loan department and the development of the online loan application (OLA) processes. This are the policies that will deal with the procedures and the resources needed in the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.3% of users find it useful

Extract of sample "Create a Security Policy"

Security policy for McBride Financial Services al Affiliation Security policy for McBride Financial Services This is a security policy that responds to the financial services of McBride Company by following the loan department and the development of the online loan application (OLA) processes. This are the policies that will deal with the procedures and the resources needed in the application of the customers online that will apply on the mortgages and apply for the loans online. The company has a number of qualified workers that have the ability, power and knowledge of keeping the information of the applicants along with their financial records.

This will enable the company to have good record on the finance sector more so when the workers are going to change the records of the customer. Keeping of the customers’ information and records will be the major responsibility of the workers. The security and loan application will cover a number of portions in the company. This are;Security policy that is physical The customers’ control over the access of the online websiteData maintenance and backup policyThe policy of the non compliance ruleThe physical control of the customers in the company will be solved by the introduction of the electronic cards for withdrawal and access purposes.

In doing so, security will be enhanced by controlling the members from having access to the wrong places at the company. If a member will be caught violating the rule of accessing unauthorized areas, he or she will be dealt with in relation to the rule of non compliance. If any of the electronic cards is lost, stolen or contain wrong key, it will be deactivated immediately by the database management system. This will be followed by the issuing of a new card replaced with the lost card and all the information be recorded down for security purposes.

The company is supposed to collect all the important information from a customer in the application of the online application of loans. Some of the important information to be collected is financial statement of the customer, the current loan state of the customer, the credit report of the customer and the property owned information of the customers. All this should be well documented and be recorded in the financial files of the customers. The information recorded in the financial file should be kept off from fire, theft, flood and lightning.

For the proper maintenance and retrieval of the company’s vital information, the database must be backed up periodically incase of data loss. Access of the customers’ accounts should be well managed and be maintained. This will be done by creating protective ways that are very sensitive. The passwords should be unique mixed with other valuables along with the encryption. Users will be assigned with a confidential user identification number that will enable for their track incase they misbehave.

The use of the regulations like Health insurance Portability and Accounting Act (HIPA) should be applied in the company accompanied with proper training of the customers. The company will educate its users thoroughly for the company to minimize insecurity. Before joining the company the users will be provided with the policy acknowledgement papers for them to agree and accept the company’s rules and regulations. Before they accept the terms and conditions of the policy, they should ensure that they have read and understood the rules very well.

References(2009, 11). Mcbride Financial Security Policy Paper. StudyMode.com. Retrieved 11, 2009, from http://www.studymode.com/essays/Mcbride-Financial-Security-Policy-Paper- 257552.html

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Create a Security Policy Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Create a Security Policy Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1642709-create-a-security-policy
(Create a Security Policy Essay Example | Topics and Well Written Essays - 500 Words)
Create a Security Policy Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1642709-create-a-security-policy.
“Create a Security Policy Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1642709-create-a-security-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Create a Security Policy

Commerce as the Transfer of Goods and Services

Therefore, once the seller has identified what to protect and what not to, he has successfully defined his security objectives and this help does Create a Security Policy which must be implemented.... Since anything that deals with the computer and the web to be precise is prone to hacking, spying, sabotage etc, it is important that a security component is emphasized when using the web.... This led to the need for beefing up security as far as e-commerce is concerned....
12 Pages (3000 words) Coursework

Developing Security Policy

Moreover, this is accomplished by listing a variety of alternatives that can be used a security policy specifically is the imperative foundation on which a valuable and complete security program can be developed.... a security policy is the most important way in which management's decision for security is converted into specific, measurable, and testable goals and objectives.... On the other hand, if there is an absence of a security policy guiding the decision makers, then decisions will be made on ad-hoc bases, by the individuals developing, installing, and maintaining computer systems, and this will result in a disparate and less than optimal security architecture being used or implemented (Weise & Martin, 2001)....
9 Pages (2250 words) Essay

Goals and Objectives of the Department of Homeland Security

There are seven assistant secretaries for the department including the assistant secretary of policy, foreign affairs, strategic management, and private sector.... The main secretary is Alan Bersin who has been employed as an acting secretary for the office of policy making (Design, 2014).... In the paper “Goals and Objectives of the Department of Homeland security” the author focuses on the main aim of the Department of Homeland security, which is to make sure that the nation is protected, secure as well as tough in opposition to terrorist activities....
2 Pages (500 words) Essay

The Rise of Militarization of American Police

The paper "The Rise of Militarization of American Police" provides a viewpoint that abandoning of community policing would be ill-advised in the light of all the achievements that it has helped bring about, being developed to not only combat crime but also as an important preventive technique.... hellip; Community-based policing emphasizes establishing connections with the communities and building good relations with them....
6 Pages (1500 words) Term Paper

Candidate for the position of Chief of the Virtual Police Department

If people believe that the community policy is in practice in their society, these people will be more possibly willing to give their good opinions, ideas and perceptions of these police.... I would not incorporate the interview with former officer since it would create some biases in my decision making....
5 Pages (1250 words) Research Paper

Performance and Security of Windows Server

The paper 'Performance and security of Windows Server' presents Windows Server 2003 which is the next generation of server operating systems.... hellip; By default, the server components of Windows Server 2003 are disabled for security purposes.... The IIS web server has improved performance and security.... One of the key features of Windows Server 2003 security is the Common Language Runtime software engine.... Another security feature of Windows Server 2003 is the ability to restrict the software running on any machine using software restriction policies....
8 Pages (2000 words) Case Study

E-commerce as a Popular Way of Doing Business

Since anything that deals with the computer and the web to be precise is prone to hacking, spying, sabotage etc, it is important that a security component is emphasized when using the web.... hellip; This report seeks to elaborate on the security aspect of e-commerce.... This led to the need for beefing up security as far as e-commerce is concerned.... The security function in the websites belonging to buyers has been the very essence of doing business....
12 Pages (3000 words) Coursework

Security Analysis of A2Z and Redesign of its Network

Finally, I will Create a Security Policy and a template for future security systems.... The author of this paper "Security Analysis of A2Z and Redesign of its Network" discusses the statistical network analysis on the examples of two companies, including the quantitive network analysis ranking of assets, NMAP, password cracking, policy creation, information about security policies.... hellip; The security systems will under updates, maintenance, and authenticity....
7 Pages (1750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us