Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Global Information security policy Document Properties Revision History Purpose

ID: 663466 • Letter: G

Question

Global Information security policy

       Document Properties

       Revision History

       Purpose Statement

       Policy Scope

       Policy Roles and Responsibilities

       Management Commitment

       Implementation Process

       Content Revision

       Policy Compliance

       Enforcement and Exception Handling

Specific Instructions Remember that you must select a multi-national company that has business units within the EU, South-East Asia, and the United States. You may utilize a fictitious organization, but the policies must still be sound. Use what you have learned from the text this semester to uncover, model, and document the global policy, as well as apply synthesis from course lectures. All areas of the template shall be fully addressed.

Each sub-section of the Global Policies must include a purpose statement that would be reflective of an actual purpose statement for your selected organization.

This is what I have so far

Document Review and Modification Statement

All policies, procedures, points of contact, personnel identified roles, and responsibilities, department contact information, storage location, and organizational structures flowcharts must be renewed annually. Refer to table below for specified review dates. The latest version of this document should be kept and stored in an accessible location and a backup of this document should be stored offsite in a secure location. The secure location will be responsibility of the CISO. This document policy applies to all employees, third party contractors, and anyone that deals with BIG Company, which includes visitors of any kind. Responsibility for review and approval will be the CISO duty on the annual renewal date and/or when new technology is required; therefore updating the policy.

Security Policy Governance

This security policy governance addresses the establishment of information security policies within BIG Company, Inc.

Overview

This policy regards the information security policy for Big Company, Inc.   

Purpose

This policy includes all aspects of management direction and support for information security in accordance with business rules, policies, and set requirements.

Scope

This policy applies to all BIG employees, contractors, consultants, temporary staff, and other workers including all personnel affiliated with third parties that use any Big Company technology and/or information technology.

Roles and Responsibilities

Management Commitment

Describes how management will support this policy the content of this policy has been reviewed and has been found to be satisfactory, acceptable, and beneficial to the Big mission. Involved management and senior management at Big are committed to supporting, and improving all aspects of the operations security efforts with in the org with affiliation with in the security govern community.

Implementation Process

This policy explains how it would implemented requirements, laws, process, team organization, strategies and technology surrounding the content of this policy are expected to evolve, and this will require BIG to regularly review and update documentation to ensure compliance and applicability. Guidance for senior management and invited technology from affiliated department

Content Revision

Compliance

Compliance of the policy should and provision of this policy, or portion therefore, be or become unlawful by virtue of a State or Fed law, such provision, or portion, shall be considered null-and-void to the extent necessary to render the reaming portion lawful. This serves

Global Policies

Acceptable Use Policy

The purpose of this policy is to establish acceptable and unacceptable uses of electronic devices and network resources. The company maintains a variety of electronic communication systems in order to effectively manage communications of business information. BIG associates and authorized contractors must use these resources responsibly, ethically and lawfully in compliance with the designated policies.

Access control Policy

BYOD Policy

Allowing employees to BYOD can encourage productivity, however, it also opens windows to a greater risk. BIG does not authorize employees the privilege of bringing and using their own smartphones, tablets, and laptops to work without permission from management. The purpose of this policy is to provide the conditions for when and how personal computing devices from authorized BIG personnel are allowed access to cooperate infrastructure and/or enterprise application, in order to protect and preserve the security and integrity.

Change Management Policy

Encryption and Decryption Policy

Incident Response Program

Information Classification Policy

Internet Usage and Social Media Policy

Logging and Monitoring Policy

PCI Scope Validation Policy

The purpose of this policy to validate and ensure that the Big offering is consistent with what is defined in the PCI report of compliance and

Enforcement and exception handling

Failure to Comply

Failure to comply with polices and procedures set forth by this policy may result in disciplinary action including by not limited to suspension with out pay and termination. Furthermore, infractions may have additional and legal ramifications according to national and state laws.

Notification of Sanctions

Exceptions Handling

Any help with any part of this would be appreciated

Explanation / Answer

Scope :

It should address all information, systems, facilities, programs, data, networks and all users of technology in the organization, without exception.

Exceptions Handling:

Under certain limited or exceptional circumstances, the policy may, as permitted or required by applicable laws and obligations, process Personal Information without providing notice or asking permissions.Businesses are provided with a flexible way to delegate handling of particular situations potentially allowing exceptions. It provides more flexibility in handling special or unanticipated situations as policy needn

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote