preview

Information Systems Security Policy Home Use Computer Policy

Better Essays

Assignment 3.1a
CIS 608
Ethelyn J. Balisteri
Bellevue University

INFORMATION SYSTEMS SECURITY POLICY—HOME USE COMPUTER POLICY IS-POL-100

Information is an asset that, like other important personal assets, is essential to an in-dividual and should be protected. Information can exist in many forms. It can be printed or written on paper, stored electronically, transmitted by post or by using electronic means, shown, or spoken in conversation. In whatever form the information takes, or means by which it is shared or stored, it should always be appropriately secured.

Personal Information security is the protection of information from a wide range of threats in order to protect personal information, minimize risk, and maximize prevention of identity theft. Information security is achieved by implementing a suitable set of con-trols, including policies, processes, procedures, and software and hardware functions. These controls need to be established, implemented, monitored, reviewed and im-proved, where necessary, to ensure that the specific security and personal objectives of are met. This should be done in conjunction with other processes.

The objectives identified in this plan represent commonly accepted goals of information security management as identified by the NIST SP 800 series.
Security Policy

The objective of information security policy is to provide management direction and support for information security in accordance to protect personal

Get Access