Question

In: Operations Management

How often should IT security policies be reviewed within an organization? What is the impact if...

How often should IT security policies be reviewed within an organization? What is the impact if these policies are not reviewed on a regular basis?

Solutions

Expert Solution

Answer

A security policy is a strategy for how your company will implement Information Security principles and technologies. It is essentially a business plan that applies only to the Information Security aspects of a business.A security policy is different from security processes and procedures, in that a policy will provide both high level and specific guidelines on how your company is to protect its data, but will not specify exactly how that is to be accomplished.

After the security policy has been in place for some period of time - which can be anywhere from three months to a year, depending on your company - the company’s information security controls should be audited against the applicable policies. Make sure that each policy is being followed as intended and is still appropriate to the situation. If discrepancies are found, or the policies are no longer applicable as written, they must be change to fit your company’s current requirements.

After the initial review process, you should regularly review the security policy to ensure that it still meets your company’s requirements. Create a process so that the policy is periodically reviewed by the appropriate persons. This should occur both at certain intervals (i.e., once per year), and when certain business changes occur (i.e., the company opens a new location). This will ensure that the policy does not get “stale” and will continue to be a useful management tool for years to come.

When changes need to be made, be sure to A) update the revision history section of the document to differentiate the new document from past versions; and B) distribute any modified user-level policies to your users. Clearly communicate the policy changes to any affected parties.

Impact if these policies are not reviewed

1)  There won't be any commitment in maintaining a secure network, which allows the IT Staff to do a more effective job of securing the company’s information assets. Ultimately, a security policy will increase the risk of a damaging security incident.  

2) A security policy can provide legal protection to your company. By specifying to your users exactly how they can and cannot use the network, how they should treat confidential information, and the proper use of encryption, you are reducing your liability and exposure in the event of an incident. If it is not reviewed then there won't be any written record of your company’s policies if there is ever a question about what is and is not an approved act.

3) Companies that do business with your company, particularly those that will be sharing confidential data or connectivity to electronic systems, will not be concerned about your security policy.

4) there won't be any fulfilled regulations and meeting of standards that relate to security of digital information.


Related Solutions

What is the value of ethical behavior within an organization? What is the impact of ethical...
What is the value of ethical behavior within an organization? What is the impact of ethical behavior on creating a positive organizational culture ? What is the effective incorporation of systems theory with regard to ethical behavior ?
What role do financial institutions play within the global marketplace? How can policies and regulations impact...
What role do financial institutions play within the global marketplace? How can policies and regulations impact financial institutions? What role does the central banking system play within the global marketplace? Would you recommend any changes to the central banking system? Why or why not?
It is very important about how you craft your organization's security policies with your organization. Your...
It is very important about how you craft your organization's security policies with your organization. Your policy should comprehensively address all the main security vulnerabilities and risks within your organization. Remember your overall security policy, not all covers computers, internet, applications, servers, user access, etc.. but many other areas which we will delve into. Attached is a sample acceptable use policy from the SANS Institute. What sections really stand out to you and why?
Q1. Define information security Q2. Describe the information security roles of professionals within an organization
Q1. Define information securityQ2. Describe the information security roles of professionals within an organizationQ3. Explain these Necessary tools: policy, awareness, training, education, technologyQ4. Explain why a successful information security program is the responsibility of both an organization’s general management and IT managementQ5. Identify the threats posed to information security and differentiate threats to the information within systems from attacks against the information within systemsQ6. Differentiate between laws and ethicsQ7. Explain the role of culture as it applies to ethics in...
Information security policies are the core internal guidance for an organization and must be enacted prior...
Information security policies are the core internal guidance for an organization and must be enacted prior to the purchase of information security controls. There is a bit of a "chicken and egg" dispute in the information security community as to whether it is appropriate to first engage in risk assessment with policies created to address those findings or whether it is appropriate to first create policies against which a risk assessment can be performed. On a more granular level, security...
address how the following elements of interorganizational culture impact change management within a health care organization:...
address how the following elements of interorganizational culture impact change management within a health care organization: Evolvement of the health care organization's mission Changing educational requirements of the workforce Organizational redesign to meet new health care initiatives Career development and enhancement opportunities within the organization Business-critical, experience-based knowledge loss of retiring employees Lack of competitive pay, burnout, morale issues, lack of advancement opportunities and Resistance to change?
Discuss the significance of formulating adequate policies and procedures in your organization. Outline the impact of...
Discuss the significance of formulating adequate policies and procedures in your organization. Outline the impact of such policies and procedures in your business continuity planning policy. Also, describe the five-step process for building a proper power for business continuity. Need 400 words
Explain the importance of system security within an organization, including discussion of the legal and ethical...
Explain the importance of system security within an organization, including discussion of the legal and ethical implications the organization could face for failing to protect their systems and information. Identify and explain three strategies organizations can implement to protect their systems and information against threats.
What principles should the information security analyst apply in order to develop appropriate acceptable use policies...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure to address confidentiality, integrity, and availability of information. Answer the following please; What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable? What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition? When and why...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure you address confidentiality, integrity, and availability of information, as well as each of the following questions: 1-What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable? 2-What should users generally be prohibited from doing with their computing and network resources? When and why would each example require...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT