Conceptual Framework or Information Security Policy

Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 7

Abstract

To protect overall security, it’s important to formulate a clear policy that states what rights the employee has and how the employee should responsibly handle company resources. That policy should be signed by each employee when he or she is first hired. In some instances, having an employee who works with sensitive or proprietary information sign a nondisclosure or confidentiality agreement is also a wise precaution. A good security policy is comprehensive and flexible; often, it’s not a single document but a group of documents, each with its own specific emphasis. The next section discusses general best practices for security policies. Then, you examine major factors that result in an effective set of rules and procedures: the consideration of cyber risk insurance coverage; the need to base a policy on a thorough risk assessment; the need to teach employees about acceptable use of network resources; the need to specify what an employee’s expected privacy rights are when on company property and equipment; the need to enable management to set priorities; the need to help administrators do their jobs; and the need to see a security policy as making subsequent risk analyses possible.

Authors and Affiliations

Rahul Mohare and Dr. U A Lanjewar

Keywords

Related Articles

ADAPTIVE PRICE EXPECTATIONS AND THE MODELLING OF WORLD GOLD PRICE DYNAMICS

Market models that incorporate inventories without including expectation factors assume that all inventories are unintended. This assumption is not true in mineral commodity markets where hedging and speculation are ri...

slugAutonomous Network Reconfiguration System with CA-AOMDV in Wireless Mesh Networks

Wireless mesh networks (WMNs) have emerged as a key technology for next-generation wireless networking. Because of their advantages over other wireless networks, WMNs are undergoing rapid progress and inspiring numerou...

slugEnhancement of Security for Initial Network Entry of SS In IEEE 802.16e

Security is the main concern in these days and everyone want to secure his communication. IEEE 802.16e is a new broadband technology that is used to provide secure wireless access to thousands of users in a city at hig...

slugINDUSTRIAL ENERGY: WHAT ROLE FOR POLICIES?

Industry in the largest energy used sector in the world today. A wide variety of energy efficiency of policies, programmes, products, services and delivery mechanisms have been implemented by countries in efforts to im...

Psychographic Segmentation of E-Retailing Consumers for Electronics Goods in Kolkata

Consumers, especially e-retailing consumers are too diverse in their psychological behavior. This paper provides a framework to identify Psychographic Segment of e-retailing consumers for Electronics Goods in Kolkata....

Download PDF file
  • EP ID EP18495
  • DOI -
  • Views 354
  • Downloads 12

How To Cite

Rahul Mohare and Dr. U A Lanjewar (2012). Conceptual Framework or Information Security Policy. International Journal of Management, IT and Engineering, 2(7), -. https://europub.co.uk/articles/-A-18495