StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Policies and Procedures Organizations Should Implement to Protect Themselves - Essay Example

Cite this document
Summary
The paper "Policies and Procedures Organizations Should Implement to Protect Themselves " asserts since advances in technology resulted in numerous information security breaches, every organization needs to have in place some information security policies to safeguard their valuable information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Policies and Procedures Organizations Should Implement to Protect Themselves
Read Text Preview

Extract of sample "Policies and Procedures Organizations Should Implement to Protect Themselves"

? Policies and Procedures That Organizations Should Implement to Protect Themselves Introduction Information about an organization and its operations provides one of the most important success factors for any firm. Private and confidential information, for instance, information about a production procedure, can be a source of competitive advantage for a company over its rivals in the market. As such, organizations need to protect their confidential information from unauthorized people, within and outside the organization. Organizations usually place great accountability and trust in their security professionals to protect their confidential information. Professional ethics plays crucial role in helping information security professional to execute their duty. However, to ensure maximum information security, organizations need to institute relevant legislations to guard against information security breach. This paper explores policies and procedure that organizations should implement to secure their confidential information. It is crucial that security forms an integral part of organizational culture. Protecting the firm from possible information security breach should be a major focus of the company’s operational process. To achieve this, security policies or e-policies provide the fundamental framework for an organization to beef security over its crucial information. Security policies are regulations that outline how organizational information are supposed to be used in executing daily organizational tasks and also dictate who is authorized to access what information. What Are Security Policies or e-policies? A security policy can be referred to as a document that gives guidelines on how an organization intends to protect its physical as well as information technology assets. According to Ciampa (2010), a security policy refers to “a document that outlines the protections that should be enacted to ensure the organization’s assets face minimal risks.”An organization’s security policy is usually referred to as a living document because it is continuously upgraded to meet emerging organizational challenges in the face of organizational change and evolving employee requirements. The security policy of an organization usually reflects on policy implementation requirements and possible corrections in case loopholes are detected (Ciampa, 2010). Recommended Information Security Policies for Organizations Control over Access to Computer Rooms In order to ensure high level security for crucial organizational information, computer rooms should be kept under lock and key at all times. Computer rooms should have doors fitted strongly and manned by security officers at all times. In addition to locking computer rooms, there should be security officers deployed to man the doors to main information areas. Only authorized personnel should access such rooms through user authentication process. Use of Passwords and Authentication Procedures The organization should have documented guidelines to control access over its crucial information areas. All computers in the organization should have passwords in relation to security demands. These guidelines need to be assessed on regular intervals. The guidelines should have password requirement and control the storage of such passwords. All users of information accessing information system of the company must be authenticated. Individuals who are authorized to access company information should have unique blend of usernames and passwords to bar unauthorized personnel or external intruders from gaining easy access to the organization’s private information. Information users are held responsible for the usage of their passwords and usernames, which they should keep secret unless called upon by the chief security officer to disclose such passwords and usernames. Data Encryption Policy The second policy that an organization can establish to protect its valuable information is data encryption. In recent times, there have been numerous data security violations. Loss of important information of an organization can lead to monetary loss as well as deterioration in reputation. As such, it is crucial to protect data at rest as well as those in flight. According to Panek and Wentworth (2010), data encryption refers to “translating data into code that is not easily accessible to users” except for the data owner. Stored data (data at rest) in storage media like disks or tape can be secured through data encryption techniques. Data encryption guard against reading or editing of stored data unless one uses the right decryption key. Algorithms utilized in encryption ensure that no person can access stored data without keying in the correct access code. Data in flight can also be protected from tapping by hackers through encryption at the source or storage network. For data encryption to be effective there must be effective management of decryption key by the users of the protected information (Panek & Wentworth, 2010). How Security Policies Should Be Implemented In Organizations The initial step in protection and enforcement is policy development (Whitman & Mattord, 2012). An organization should focus on identifying and securing information technology resources that are most crucial to the business. This can be done by engaging employees at all levels in order to determine their security needs. After policy development, the organization should then establish and implement a mechanism of reporting information security breaches. The employees of the organization should be encouraged to openly report any violation of security policies to relevant authority. Thirdly, the organization should make it clear in its policies the websites that can be accessed by employees and those that are prohibited. Employees should be made aware of what the company expects from them as they use internet at work. Fourth, the organization should update its security policy regularly to ensure it is relevant and serves the emerging needs of all employees. Lastly, ensure that the policies created are in line with relevant industry laws as well as other corporate policies (Whitman & Mattord, 2012). Conclusion Confidential information about organizations remains crucial competitive tool and must be protected from unauthorized access. In recent times where advance in technology has resulted into numerous information security breaches, every organization needs to have in place some information security policies to safeguard their valuable information. There are critical information about organizations that can cause financial and reputation loss if accessed by unauthorized people and hence must be secured. Organizations can protect their valuable information by controlling access to data, instituting measures to regulate access to physical assets such as computers and encrypting data, both at rest and in flight among other security policy measures. Unless documented and effectively disseminated, employees will remain oblivious to security policies requirements and their role in protecting organizational information. A security policy is crucial for the organization because it minimizes the chances of security violations and loss of data. It facilitates application of best computing and data management practices by employees, thus reducing the likelihood of losing vital organizational information. References Ciampa, M.D. (2010). Security awareness: applying practical security in your world, 3rd Ed. Boston, MA: Cengage Learning. Panek, W. & Wentworth, T. (2010). Mastering Microsoft Windows 7 administration. Indianapolis, Ind.: Wiley Pub. Whitman, M.E. & Mattord, H.J. (2012). Principles of information security, 4th Ed. Boston, MA: Course Technology. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/management/1471765-information-security-and-ethics
(Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 Words)
Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/management/1471765-information-security-and-ethics.
“Information Security and Ethics Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/management/1471765-information-security-and-ethics.
  • Cited: 0 times

CHECK THESE SAMPLES OF Policies and Procedures Organizations Should Implement to Protect Themselves

Understanding IT security and its impact to organizations

The frameworks have considered the employment of human assets, technology and organizational framework through the implementation of policies and procedures to fight any attempts to circumvent the... The primary question that this thesis shall answer is the effort to implement Information Technology Security in organization worth the effort?... It should be noted that the crime has already been committed in this instance.... This study attempts to compare the effort with actual tangible benefits using the experiences of organizations as described by various authors in implementing Information Security Management System frameworks....
15 Pages (3750 words) Research Paper

Organization change and innovation

Many researchers argue that more and more financial as well as political divisions should currently highlight either the organic representation or inter-organizational networks.... Perspectives on Organizational Change Organizational change is controlled by the institutionalization of authority in addition to the activities of interest groups in as well as around organizations.... The stress of international competition as well as deregulation has caused a number of organizations and associations to look for new types of organization and various representations for managing individuals....
20 Pages (5000 words) Essay

Why organizations changes as well as why they fail to change

??There has been increasing research on organizational change that seeks to explain both why organizations changes as well as why they fail to change”.... Introduction: ... Most theories and literatures have been published between 1960s and 1980s.... .... ... ...
128 Pages (32000 words) Thesis

Challenges in Implementing Information in a Health Care Organization

Interoperability with the major Health Maintenance Organization (HMO) and another hospital system should also be taken into consideration due to the importance of collaboration in the medical care field.... This essay "Challenges in Implementing Information in a Health Care Organization" are international standards that will be presented to provide insights into what other healthcare organizations are using....
14 Pages (3500 words) Essay

ANALYSIS OF CASE STUDIES OF ORGANIZATIONS

The five main responsibilities of the Cabinet are in the areas of budget and policy framework, promotion of the economic, social or environmental well-being of the region, leading the search for best value with the help of Scrutiny Committees, towards continuous improvement in the delivery of services, to exercise all the powers and duties of the Council, and to implement the requirements of Social Inclusion and Equal Opportunities in the delivery of services (Redbridge Council, 2008)....
16 Pages (4000 words) Case Study

Information Security Implementation Plan

The set policies and guidelines comply with rules and standards of HIPAA security.... Consequently, the policies and guidelines of the proposal are pertinent to information security and privacy that are currently put forward by bodies of the state, federal regulators, and the state.... In conjunction with the MAC address, I will implement filtering to offer more security.... In addition, the paper outlines the planning guidelines towards the aims, security policies, and standard taxonomy....
38 Pages (9500 words) Essay

Critical Evaluation of an Organizations Corporate Social Responsibility

The CSR responsibility is managed effectively at all levels in the organizations.... Many national and international organizations utilize the strategies of benchmarking in order to enter into competition with their rival companies in the same industry with respect to the formulation, implementation and effectiveness of the corporate social responsibilities policies.... Amongst many international and national companies, Unilever is one of the most successful business organizations in the line of consumer products worldwide....
10 Pages (2500 words) Assignment

The Impact of Health and Safety Management on Organisations and Their Staff

In addition, the health and safety laws and procedures are displayed in major notice boards and other prominent positions in the workplaces.... The responsibility of the employee is to follow the policies provided whereas the employer should provide appropriate information, instructions, and training on the health and safety issues for the employees to work safely.... The coordinator should provide every new recruit with a policy statement that states how they can access information on health, safety, and security and fire procedures as well as information on the outcomes of risk assessments and inspections....
15 Pages (3750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us