Global Information security policy Document Properties Revision History Purpose
ID: 663466 • Letter: G
Question
Global Information security policy
Document Properties
Revision History
Purpose Statement
Policy Scope
Policy Roles and Responsibilities
Management Commitment
Implementation Process
Content Revision
Policy Compliance
Enforcement and Exception Handling
Specific Instructions Remember that you must select a multi-national company that has business units within the EU, South-East Asia, and the United States. You may utilize a fictitious organization, but the policies must still be sound. Use what you have learned from the text this semester to uncover, model, and document the global policy, as well as apply synthesis from course lectures. All areas of the template shall be fully addressed.
Each sub-section of the Global Policies must include a purpose statement that would be reflective of an actual purpose statement for your selected organization.
This is what I have so far
Document Review and Modification Statement
All policies, procedures, points of contact, personnel identified roles, and responsibilities, department contact information, storage location, and organizational structures flowcharts must be renewed annually. Refer to table below for specified review dates. The latest version of this document should be kept and stored in an accessible location and a backup of this document should be stored offsite in a secure location. The secure location will be responsibility of the CISO. This document policy applies to all employees, third party contractors, and anyone that deals with BIG Company, which includes visitors of any kind. Responsibility for review and approval will be the CISO duty on the annual renewal date and/or when new technology is required; therefore updating the policy.
Security Policy Governance
This security policy governance addresses the establishment of information security policies within BIG Company, Inc.
Overview
This policy regards the information security policy for Big Company, Inc.
Purpose
This policy includes all aspects of management direction and support for information security in accordance with business rules, policies, and set requirements.
Scope
This policy applies to all BIG employees, contractors, consultants, temporary staff, and other workers including all personnel affiliated with third parties that use any Big Company technology and/or information technology.
Roles and Responsibilities
Management Commitment
Describes how management will support this policy the content of this policy has been reviewed and has been found to be satisfactory, acceptable, and beneficial to the Big mission. Involved management and senior management at Big are committed to supporting, and improving all aspects of the operations security efforts with in the org with affiliation with in the security govern community.
Implementation Process
This policy explains how it would implemented requirements, laws, process, team organization, strategies and technology surrounding the content of this policy are expected to evolve, and this will require BIG to regularly review and update documentation to ensure compliance and applicability. Guidance for senior management and invited technology from affiliated department
Content Revision
Compliance
Compliance of the policy should and provision of this policy, or portion therefore, be or become unlawful by virtue of a State or Fed law, such provision, or portion, shall be considered null-and-void to the extent necessary to render the reaming portion lawful. This serves
Global Policies
Acceptable Use Policy
The purpose of this policy is to establish acceptable and unacceptable uses of electronic devices and network resources. The company maintains a variety of electronic communication systems in order to effectively manage communications of business information. BIG associates and authorized contractors must use these resources responsibly, ethically and lawfully in compliance with the designated policies.
Access control Policy
BYOD Policy
Allowing employees to BYOD can encourage productivity, however, it also opens windows to a greater risk. BIG does not authorize employees the privilege of bringing and using their own smartphones, tablets, and laptops to work without permission from management. The purpose of this policy is to provide the conditions for when and how personal computing devices from authorized BIG personnel are allowed access to cooperate infrastructure and/or enterprise application, in order to protect and preserve the security and integrity.
Change Management Policy
Encryption and Decryption Policy
Incident Response Program
Information Classification Policy
Internet Usage and Social Media Policy
Logging and Monitoring Policy
PCI Scope Validation Policy
The purpose of this policy to validate and ensure that the Big offering is consistent with what is defined in the PCI report of compliance and
Enforcement and exception handling
Failure to Comply
Failure to comply with polices and procedures set forth by this policy may result in disciplinary action including by not limited to suspension with out pay and termination. Furthermore, infractions may have additional and legal ramifications according to national and state laws.
Notification of Sanctions
Exceptions Handling
Any help with any part of this would be appreciated
Explanation / Answer
Scope :
It should address all information, systems, facilities, programs, data, networks and all users of technology in the organization, without exception.
Exceptions Handling:
Under certain limited or exceptional circumstances, the policy may, as permitted or required by applicable laws and obligations, process Personal Information without providing notice or asking permissions.Businesses are provided with a flexible way to delegate handling of particular situations potentially allowing exceptions. It provides more flexibility in handling special or unanticipated situations as policy needn
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.