Information Security Policies - The Legal Risk of Uninformed Personnel
نویسنده
چکیده
Although the development and deployment of an effective information security infrastructure within the company is imperative to the success of the overall information security discipline, it will be a futile exercise if those people who are expected to maintain and monitor information security in the company do not know what is expected and demanded of them. The importance of information security policies can not be overemphasised as it may be the most cost-effective action a company may take against information security breaches and incidents. The employees of a company may be viewed as the first line of defense when it comes to the early detection of problems. Consequently, employees on all levels of the company must be made aware of the pivotal role security, and specifically information security plays within a company. They need certainty on what their responsibility for information security within the company is, and what will happen if they do not comply with their security duties. Put differently employees need to be told what they may and may not do with corporate information assets, resources and systems. Furthermore, it should be kept in mind that although traditionally information security was viewed by the board of directors and top management as a necessary evil, at present companies are being placed under increased pressure by means of new laws and regulations to ensure that information security is effectively implemented within the company. Consequently, if an information security breach or incident occurs because of the actions of an uninformed or negligent employee, the board of directors and top management may be held personally liable for the conduct of that employees. It is therefore imperative that the information security policy of the company is formulated correctly in order to limit a company’s potential legal liability for the negligent or even intentional acts of its employees.
منابع مشابه
Identifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملA distributed requirements management framework for legal compliance and accountability
Increasingly, new regulations are governing organizations and their information systems. Individuals responsible for ensuring legal compliance and accountability currently lack sufficient guidance and support to manage their legal obligations within relevant information systems. While software controls provide assurances that business processes adhere to specific requirements, such as those der...
متن کاملInformation Security Policy Development and Implementation Piggybacking onto Finnish National Security Auditing Criteria KATAKRI
The “weakest link” of security is the human and organizational aspects of information security. Nowadays, risk assessment methods and information security plans and policies are an essential part of many organizations. However, the managerial aspects of information security often remain challenging, especially in emerging technological contexts, and management executives lack an understanding o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006