Information Technology Security Policy Framework

Read Complete Research Material



Information Technology Security Policy Framework

[Writer's initials]

[Professor's name]

[Course Title]

[Dated]

Information Technology Security Policy Framework

Introduction

Information in every aspect is a vital asset in the significance to the Insurance Company business operations and the viability in the long term. Insurance company must make sure that the assets' information are encrypted and protected in a manner so that risk of unauthorized information is reduced and which is cost effective. The modification, disclosure and the destruction whether intentional or accidental is avoided by means of the security.

The insurance company security policy shall adopt an information security risk management approach. The risk management approach needs assessment, identification, and the mitigation which is legit and appropriate of the vulnerabilities and the threats that can have adverse impact on the assets and records of the Insurance Company.

Objectives

In order to implement the security policy in the organization i.e. the insurance organization we need to put in mind the following points:

Allow the professionals and employees which are working there to privatize the documents of their customers.

The keep the customers' private files confidential.

To setup passwords and usernames of the employees

To comply with all the security measures.

Ensure all staff shutdown workstation after using at the end of the day

To ensure the prohibition of the company's private information is held.

To ensure that the hard copied documents which can be a threat to the company are not to be thrown in trash and are shredded.

Protect all data from unauthorized internal and external access (Van & Charl, 2001).

Framework Selected

There are many benefits of the corporate security policies. They give standard baseline modules and checks of the security policy, based on the organizations policies and standards' information security. They make scalable basis, solid for our chosen insurance company to product deployment like ESM. The security policy which we are using as a tool is the Symantec Enterprise Security ...
Related Ads