Access over 35 million academic & study documents

It Security Policies

Content type
User Generated
Subject
Computer Science
School
University of the Cumberlands
Type
Homework
Rating
Showing Page:
1/6
Running head: IT SECURITY POLICIES 1
IT Security Policies
Author’s name
Institutional affiliation

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6
IT SECUIRTY POLICIES 2
Introduction
Employers and employees alike are called upon to handle company information with a
high level of confidentiality, lest it falls into the wrong hands. Therefore, the management of a
company needs to ensure that they have put in place effective and suitable security policies that
will safeguard the confidentiality of such information (Compliance Forge, 2017). Therefore data
security and confidentially remains an important aspect in the planning of information
technology infrastructure. There are also legal aspects that relate to the cyber-security where
customers or systems users can seek legal interventions in case they feel that their data has been
used inappropriately or exposed to the wrong audience. It is desirable, therefore, that an
organization develops principles with the potential to facilitate in sharing of its vision amongst
employers and the management alike. Additionally, the principles so established should be seen
to empower others through their integration with various support processes.
Designing effective IT Policies and Standards
If an organization is to effectively develop IT Policies that are in alignment with its goals,
there is a need first to ensure that the various business processed are in alignment with the
controls necessary for the execution and sustenance of the projected security policies. For
instance, let us assume that an employee within the organizations wishes to access the
company’s server urgently. Let us also assume that this happens very late in the night, possibly at
midnight, when the IT personnel are not on duty. For this employee to access the server in
question, they need first to bypass a fire call system. Such a procedure requires the approval of a
manager. Only then can they hope to be issued with a password and ID (Compliance Forge,
2017).

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
Running head: IT SECURITY POLICIES IT Security Policies Author’s name Institutional affiliation 1 IT SECUIRTY POLICIES 2 Introduction Employers and employees alike are called upon to handle company information with a high level of confidentiality, lest it falls into the wrong hands. Therefore, the management of a company needs to ensure that they have put in place effective and suitable security policies that will safeguard the confidentiality of such information (Compliance Forge, 2017). Therefore data security and confidentially remains an important aspect in the planning of information technology infrastructure. There are also legal aspects that relate to the cyber-security where customers or systems users can seek legal interventions in case they feel that their data has been used inappropriately or exposed to the wrong audience. It is desirable, therefore, that an organization develops principles with the potential to facilitate in sharing of its vision amongst employers and the management alike. Additionally, the principles so established should be seen to empower others through their integration with various support processes. Designing effective IT Policies and Standards If an organization is to effectively develop IT Policies that are in alignment with its goals, there is a need first to ensure that the various business processed are in alignment with the controls necessary for the execution and sustenance of the projected security policies. For instance, let ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4