Information Security Policies, Standards and Procedure
As a result of the adjustments in the way business is conducted, ownership of information does not carry the same clear accountability it once did. Physical and behavioural boundaries used to exist around information management but these can be missing in the modern workplace. Clearly thought-out information security policies, standards and procedures addressing internationally supported standards, will go a long way to addressing the risk exposure these changes have created. In this third paper, “Policies, Standards and Procedures,” we discuss guidelines for effective information security management.
Please supply your email address to access the content.
- Toyota funds AI research to build autonomous cars
- Uber links to sensitive ride data now expire after 48 hours
- Connected homes, smartwatches and gaming PCs dominate IFA in Berlin
- Dropbox's head of enterprise says collaboration will set it apart
- Microsoft kills off some of Nokia's apps for Windows Phone
- AOL acquires Millennial Media to bolster in-app and mobile smarts
- The 7 common mistakes marketing leaders are still making
- How Greenstone is uniting IT/marketing in the name of audience management
- Rakuten Marketing chalks up rapid Aussie digital advertising growth
- Paid endorsements get Xbox One marketer in trouble with FTC