Conceptual Framework or Information Security Policy

Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 7

Abstract

To protect overall security, it’s important to formulate a clear policy that states what rights the employee has and how the employee should responsibly handle company resources. That policy should be signed by each employee when he or she is first hired. In some instances, having an employee who works with sensitive or proprietary information sign a nondisclosure or confidentiality agreement is also a wise precaution. A good security policy is comprehensive and flexible; often, it’s not a single document but a group of documents, each with its own specific emphasis. The next section discusses general best practices for security policies. Then, you examine major factors that result in an effective set of rules and procedures: the consideration of cyber risk insurance coverage; the need to base a policy on a thorough risk assessment; the need to teach employees about acceptable use of network resources; the need to specify what an employee’s expected privacy rights are when on company property and equipment; the need to enable management to set priorities; the need to help administrators do their jobs; and the need to see a security policy as making subsequent risk analyses possible.

Authors and Affiliations

Rahul Mohare and Dr. U A Lanjewar

Keywords

Related Articles

slugAN ANALYSIS OF THE GROWTH OF LIFE INSURANCE CORPORATION OF INDIA(LIC) – IN THE CONTEXT OF POST LIBERALIZATION ERA

The history of the Indian insurance sector dates back to 1818, when the Oriental Life Insurance Company was formed in Kolkata. A new era began in the India insurance sector, with the passing of the Life Insurance Act o...

Variatonal Iteration Method for Solution of One-Dimensional Heat Equation with Nonlocal Conditions

The present paper discusses the closed-form solution of the one dimensional Heat equation with Nonlocal condition by Variational Iteration Method (VIM). The advantage of this method is to overcome the difficulty of cal...

FOREIGN DIRECT INVESTMENT IN DEFENCE SECTOR: SECURITY CONCERN OR STRENGTHENING INDIA’S DEFENCE

India is surrounded by the hostile neighbors. The need for defence of its borders has been on priority since independence. For this purpose defence production has to be upgraded to make it at par with the military powe...

FDI IN INDIAN RETAIL SECTOR

Indian retail industry is one of the sunrise sectors with huge growth potential. According to the Investment Commission of India, the retail sector is expected to grow almost three times its current levels to $660 bill...

Evaluation of Effectiveness of Internal Auditing Service in Southern Public Regional Bureaus, Ethiopia

An efficient and effective practice of internal auditing system is as a whole becomes vehicle for efficient and effective performance of the organization.The internal auditor is often considered one of the core pillars...

Download PDF file
  • EP ID EP18495
  • DOI -
  • Views 357
  • Downloads 12

How To Cite

Rahul Mohare and Dr. U A Lanjewar (2012). Conceptual Framework or Information Security Policy. International Journal of Management, IT and Engineering, 2(7), -. https://www.europub.co.uk/articles/-A-18495