The Security Policy

Improved Essays
This introduces the security policy, briefly summing up the need of the security policy and the areas it covers.
#
This section covers who the policy applies too, in this case it is all staff and selected college partners that have access to College information.

It also covers the sources of which this policy covers, which are Electronic and Physical sources. Electronic covers; e-mail, Word documents, audio recording, student record information, financial information, etc.
Physical covers; physical printed letters, handwritten notes, learning agreement forms etc.
#
This section states the objectives of the security policy. These are the main goals of this policy, stating what the security policy includes and is planned to achieve.
#
This
…show more content…
#
This explains how the different types and volume of information relate to how staff are expected to handle the information. And that all staff who have access to use the information should be shared.
It also states the two types of information which define a risk; Personal information, and Business sensitive information.
#
This states that the college recognises several information assets categories of the college which are important to the running of the business.
#
This section states how all information captured must be securely stored and protected. It details how the data must be protected in a layered approach.
#
This states that there is an Asset register, of which each information asset has its own Information Asset Owner assigned.
The Records of the asset include any associated risks to its integrity or security, including the current risk rating and control measure in place to keep the asset
…show more content…
It details how all staff have a responsibility to keep the information secure. Including how they must share information physically, electronically and during third party access.
#
This states how long information is held by the college for, and how it is disposed of. The Information Asset owners define these factors.
#
This section of the policy shows how a professional culture and a positive attitude toward managing the information assets is critical to the policy.
It includes which staff are required to undertake information Governance training. And which staff will receive additional training.
Also the policy states that breaches of information security could result in disciplinary action. Of which will depend on the nature of the breach.
#
This section details how incident reporting and recovery should be dealt, including the procedure for several scenarios.
#
This sections states how the college should review how the college is performing, including the procedure for this. It also states which staff should report to which staff, and what information should be

Related Documents

  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    A1: Business Objective: Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals. A2: Security Principle The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    1. PHYSICAL SECURITY POLICY 1.1 Overview This policy is designed to set how Dalton, Walton & Carlton, Inc. (DW&C) strives to protect its employees, visitors and assets (buildings, property, information) against physical threats including but not limited to crimes (criminal damage and theft) and terrorism through the use of physical security controls.…

    • 1248 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This policy provides information on the facility's badge program. The purpose of the program is to enhance the security and safety of organization's employees and information. The command realizes the added burden that increased security measures can place on all employees however, security is primary safeguard against threats. It is our intent to work collaboratively as additional mechanisms and practices are imposed to continuously improve the security program. This policy also addresses the responsibility of all employees to comply with the organization's security measures as well as interfering with or disabling any security-related measures.…

    • 436 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Zagga Market

    • 2029 Words
    • 9 Pages

    Part B – ACL training policy – Zagga Market 1. Introduction and purpose 1.1 Introduction The NCCP Act (together with the National Consumer Credit Protection Regulations 2010 (Cth)) requires credit licensees to take reasonable steps to ensure that its representatives comply with the NCCP Act (s47(1)(e)), maintain the competence to engage in the credit activities authorised by its licence (s47(1)(f)), and ensure that its representatives are adequately trained and are competent to engage in the credit activities authorised by its licence (s47(1)(g)). Zagga Market is committed to ensure that it complies with these ongoing obligations.…

    • 2029 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    ATO Personal Statement

    • 694 Words
    • 3 Pages

    I am an IT Security Analyst in Enterprise Solutions and Technology’s (EST) Information and Cyber Security Management stream. In this role, I advise internal and external stakeholders about the ATO’s approach to contemporary risk management for corporate security practices and emerging technology My awareness of the ATO’s security posture and risk appetite is supplemented by knowledge I have gained from formal Information Security accreditations and industry conventions. I apply this proficiency to represent my team as a subject matter expert across various security services, such as: security intelligence and monitoring; policies, education and support; and governance reporting. In doing so, I promote enhanced information management and security…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In our nation’s infrastructure, the Government Facility Sector covers a large amount of buildings both stateside and at oversees. Many of these facilities are open public places and deal with business, recreational and business activities. According to (Logan & Ramsay,2012,p.77),” Critical Infrastructure protection and resilience takes place in an environment of policy, strategy, plans, and laws at the national, state, and local levels.” In that, many of these locations are leased, or owned by federal, state and local levels of government. The Governmental facility Sector can include military bases, office buildings, laboratories, courthouses, educational facilities, etc.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    London Heathrow Airport Introduction London Heathrow Airport is a most important international airport in West London, England, United Kingdom. Heathrow is one of the busiest airports in the United Kingdom and the busiest airport in Europe by passenger traffic. It is also the third busiest airport in the world in 2014, it handled a record of 73.4 million passengers, a 1.4 percent increase from 2013. Heathrow is situated in 22 km; 14 mi, west of Central London, and has two parallel east–west runways along with five terminals which covers 12.14 square kilometres. The airport is owned and operated by Heathrow Airport Holdings, which itself is owned by FGP TopCo Limited, an international consortium led by the Spanish Ferrovial Group that includes…

    • 1064 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Some organizations deliberately limit sharing of information and knowledge because of the threats associated with industrial espionage and concerns about diverting or overloading employees’ work-related attention (Hatala & Latta, 2009) .If an organization has ever found itself in a situation where its information has been obtained by people with bad intentions and who wished to use for undesirable activities then it would wiser for the board to try and put measures in place that will ensure that their information does not end up in the wrong hands. In my view this could have been the main reason why the council included clause 20.1 in the terms of service. This will then lead to the inclusion of clause 20.3 in the terms of service, as the council is trying to make employees aware of the consequences of going against the terms of clause of…

    • 1515 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Human Dimensional Impacts upon Information Security Infrastructure William Fisher University of Maryland University College CSEC610 Cyberspace and Cybersecurity Professor Hall Abstract Evaluating the vulnerabilities of an organization’s information security starts with the risk assessment. The process includes the method performed and current protocols to both measure the risk involved and address attacks. Typically, businesses will have a network tailored to their particular needs balancing cost and need. All the technological tools commercially available can build a commanding network that contains the latest hardware and the most sophisticated software; however, those systems have but one unpredictable fault, the human factor.…

    • 2361 Words
    • 10 Pages
    Great Essays
  • Great Essays

    Although current operations are done by organization’s staff, specialised support is done by suppliers’ specialists. The most relevant risks identified are related with access records. The ISO 27001 Standard recommends that all accesses and record changes should be logged.…

    • 1280 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Mobile Security Essay

    • 2396 Words
    • 10 Pages

    There are many concerns that can impact a work environment affecting the company, employees, and customers that are faced every day. The damaging implications can arise from security concerns that could lead to theft, identity theft, fraud, and much more. The concerns that may arise when determining the proper security measure to insure in a company can only be beneficial when protecting the company before damage is done. As businesses incorporate a BYOD strategic plan, mobile security becomes even more important.…

    • 2396 Words
    • 10 Pages
    Superior Essays
  • Great Essays

    An asset is identifiable if it separable, meaning it can be sold, transferred, rented or exchange. An asset is also identifiable if it arises from legal or contractual rights (IASB, 2014). The entity must be able to control the intangible asset (usually evident by legal right). IAS 38 raises the difficulty of proving control over employees, but identifies that the skills, knowledge and experience of an employee can result in future economic benefits for an entity. Future economic benefits that can be generated by intangible assets can be revenue or any cost…

    • 5356 Words
    • 22 Pages
    Great Essays
  • Improved Essays

    It 's been my experience that many organizations underestimate the importance of well-planned and well written policies and procedures in their push towards confidentiality, integrity and availability... the ultimate goals of a sound information security framework. Policies and procedures are the critical underpinnings to a sustainable security posture. Specifically, the Information Security Policy, when well defined, is a set of instructions to help guide IT professionals define and enact security controls -including access and authentication methods. It will establish what the organization considers acceptable versus unacceptable behavior.…

    • 727 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Shell instructs and requires of its employees to safeguard the company’s information and its assets. It elaborates on the importance it gives to the personal information of its employees and customers and what it expects of them. It also directs on how the employees should utilize the assets of the company and limits on the use of the company’s assets for personal use. It also explains on the importance of the company’s data and how this data should get protected. The chapter also elaborates on record management expected of the employees.…

    • 1186 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    5 Basic Security Measures

    • 1067 Words
    • 5 Pages

    5. Security measures There is a list of five basic security measures that every organisation can implement, such as: Physical protection: This embraces the use of tangible hindrance planned to safeguard robbery and unofficial entry. If entrance to rooms and hardware are confined, then the likelihood of robbery and destruction is decreased. Biometric control: This measure makes use of the distinctive attributes of people to limit ingress to delicate information or hardware.…

    • 1067 Words
    • 5 Pages
    Improved Essays