This website uses cookies to ensure you have the best experience. Learn more

Security Policy Essay

848 words - 4 pages

Law and Policy Case Study

September 15, 2013


Introduction

In the field of information security, there are many types of law. As senior managers, it is important to be knowledgeable of the legal environment. Once this information is learned and retained, then it will increase access and understanding of information security. Laws and practices that are related to information security will be discussed and how these laws impact organizations today and ensures confidentiality, integrity, and availability, of information and information systems. Governance policy will be discussed and recommendations for development of governance policy in an organization.

...view middle of the document...

The Privacy Act governs the compilation, usage, and publication of the record of an individual maintained by federal agencies. The Privacy Act defined a record as “any item, collection, or grouping of information about an individual that is maintained by an agency and contains his or her name or another personal identifier (Stevens, 2010 pg. 7).” The Computer Security Act of 1987 made it that all federal computer systems that contain information that is classified, have security plans in place and to have security training for anyone that deals with the systems. The HIPAA is aimed for the security of medical information. Medical information obtained in medical practices must maintain its privacy at all costs. The Veterans Affairs Information Security Act requires the Veterans Administration to add information security procedures to protect veterans’ personal information that is sensitive. The Federal Information Security Management Act of 2002 deals with government agencies providing protection for systems and agency information.

The impact of these five laws upon how an organization ensures confidentiality, integrity, and availability of information and information systems is tremendous. Nobody wants personal or private information put into the public eye or available to someone that is not entitled to the specific information. These laws and regulations are put into place to protect confidentiality. In particular, the HIPAA affects hospitals and any place in the medical field. These types of places should not give any medical history about individuals to anyone but the individual unless agreed upon otherwise. Each of these individually deals with maintaining confidentiality of software and information so it will not be shared illegally. If these laws are followed, then the integrity of companies will be maintained. Everything that is shared or maintained through companies should be true and not illegally edited to...

Other Papers Like Security Policy

Information Security Policy Essay

1790 words - 8 pages of this policy. Contents The topics covered in this document include: • Statement of responsibility • The Internet and e-mail • Computer viruses • Access codes and passwords • Physical security • Copyrights and license agreements Statement of responsibility General responsibilities pertaining to this policy are set forth in this section. The following sections list additional specific responsibilities. Manager responsibilities Managers

Heart Healthy Information Security Policy Essay

540 words - 3 pages Introduction to Policy Augmentation Process Due to the fact that both HIPAA and HITECH are non-prescriptive security frameworks HITRUST common security framework (CSF) was leveraged to augment the Heart-Healthy Insurance Information Security Policy. Moreover, HITRUST CSF was chosen as it maps to various other information security frameworks applicable to Heart-Healthy Insurance Company (i.e. HIPAA, HITECH, PCI, ISO 27000-series, etc

Global Security Policy - Week 5 - Cmgt-400

969 words - 4 pages Global Security Policy CMGT-400 Monday, May 11, 2015 Vijay Bhaskar Jonnalagadda Global Security Policy Organizations with offices in multiple countries have to strategically implement personnel, logistics, network configurations, and inventory; but they also have to create a security plan to secure these assets to keep their customer, brand integrity, and profits. Some of the issues faced while maintaining security for a company in

Unit 4 Assignment 1: Enhance an Existing It Security Policy Framework

698 words - 3 pages Quintin Damare’ 1/23/15 Unit 4 Assignment 1: Enhance an Existing IT Security Policy Framework 1. Purpose The purpose of this policy is to define standards for connecting to Richman Investment's network from any host. These standards are designed to minimize the potential exposure to Richman Investment from damages which may result from unauthorized use of Richman’s Investment resources. Damages include the loss of sensitive or company

Is4550 Week 5 Lab

1642 words - 7 pages ------------------------------------------------- Week 5 Laboratory: Part 1 Part 1: Assess and Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework

Cmgt400 Week 4 Individual

1359 words - 6 pages The Role of Information Security Policy A successful Information Security Program is determined by how the security policy for an organization is developed, how it is implemented, and maintained. An effective sound security policy creates a solid foundation for an information system. The policy makers must emphasize that within the organization, the role played by information security is of paramount importance. The system administrator is

Beth A Grillo - It540 Management Of Information Security - Assignment - Unit 2

297 words - 2 pages Unit 2 Assignment: Security Policy Implementation Beth A. Grillo, MHA, CPC-A July 19th, 2016 IT540-01: Management of Information Security Dr. Kenneth Flick Kaplan University Table of Contents Unit Two Assignment: Security Policy Implementation 3 Part 1: Step 29 3 Part 1: Step 36 3 Part 3: Step 33 4 Part 3: Significance of Strict Password Policy 5 Reference 6 Unit Two Assignment: Security Policy Implementation Part 1

Title Is Awesome

1179 words - 5 pages IS 471 Policy Development and Security Issues Lab 4 (Due October 22, 2014) Introduction In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to

Course Discription

968 words - 4 pages Respond to weekly discussion questions. 3 Learning Team Instructions Draft a 2-3 page description on the web security issues and concerns present at each Riordan plant. 9/2/13 5 Individual Security Policy Create and submit a 2-3 page security policy for McBride Financial Services, located in the Virtual Organizations. Develop a policy based on perceived needs associated within the loan department and issues in implementing online loan applications. 9/2/13 15

Linux Security

448 words - 2 pages Linux Security Project Part 1 Instructor Sandro Tuccinardi Student Brian Dupee Security Policy Outline First World bank wants to provide banking services online to its customers. The institution estimates over $100,000,000 a year in online credit card transactions for loan applications and other banking services. According to a team that was formed using a Linux an open source infrastructure would roughly as

Security Breach

1832 words - 8 pages potential customers and communicate with them effectively. Security policy and Response of firm on Security breach To secure the data of customers and software information of the firm, Sony group privacy policy is used by Sony Corporation. In this, to win confidence and trust of the customers, appropriate use and security control tools are focused by the firm under this security policy. Management of the firm believes to give priority to

Related Essays

Security Policy Essay

2866 words - 12 pages , the importance of establishing good security policies cannot be overstated. This does not only serve to enhance a company’s daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security. A security Policy is basically a plan outlining a company’s critical assets are and how they must (and can be) protected. Its main purpose is to provide staff with a brief

Security Policy Document Essay

2165 words - 9 pages 1.0 Purpose The purpose of this policy is to describe the security requirements for Global Distribution, Inc. (GDI). It is important that GDI protects the confidentiality, integrity and availability of information that is essential for day-to-day business operations. This policy will apply to all information that is electronically stored, received, typed, printed, filmed, and generated. Information technology systems are critical for Global

Security Policy Week 4 Essay

547 words - 3 pages This document is to describe the Information Security requirements of Online Application Services and Application Service Providers that engage in business with McBride Financial Services. This policy applies to any use of Online Loan Applications (OLA) and any outsourcing to Application Service Providers (ASP) by McBride Financial Services, independent of where hosted. The Online Loan Application or Application Service Provider's Sponsor

Physical Security Policy Essay

749 words - 3 pages Associate Level Material Appendix E Physical Security Policy Student Name: xxxxxxxxxxx University of Phoenix IT/244 Intro to IT Security Instructor’s Name: xxxxxxxxx Date: 4.14.13 Physical Security Policy