Preview

Information Security Plan

Satisfactory Essays
Open Document
Open Document
546 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Plan
Jonathan Larson
Information Security Plan
Information Security Plan

Objective:
Our objective in the development and implementation of this written information security plan is to create effective administrative, technical and physical safeguards in order to protect our customer non-public information. The Plan will evaluate our electronic and physical methods of accessing, collecting, storing, using, transmitting, protecting, and disposing of our customer’s non-public personal information.

Purpose:
Ensure the security and confidentiality of our customers information
Protect against any anticipated threats or hazards to the security or integrity of our customers
Protect against unauthorized transactions or access to or use of customer information that could result in substantial harm or inconvenience to any of our customers

Plan:
Identify reasonable foreseeable internal and external threats that could results in unauthorized disclosure, misuse, alterations, or destruction of customer information.
Assess the likelihood and potential damage of these threats, taking into consideration the sensitivity of customer information.
Evaluate the sufficiency of existing policies, procedures, customer’s information systems, and other safeguards in place to control risk.
Steps:
A) Appoint a specific person or persons within the firm to be responsible for:
Initial implementation of the plan
Training of employees Regular testing of the controls and safeguards established by the plan
Evaluate the ability of prospective service providers to maintain appropriate information security practices ensuring that such providers are require complying with this information security plan, and monitoring such providers for compliance.
B) Conduct annual training session for all owners, managers, employees, and independent contractors- and periodic training for new employees
C) Determine reasonably foreseeable internal threats that could result in unauthorized

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Global’s risk management approach was a key factor in the success of their efforts to protecting their client’s information assets. By utilizing risk management strategies Global was able to detect vulnerabilities where there were the most likelihood of threat and implement controls to detect and/or prevent breaches of the security controls. The risk management process ensured Global addressed security measures at all levels of the…

    • 515 Words
    • 3 Pages
    Good Essays
  • Better Essays

    It is essential in any business, not just health care to understand how finances directly affect the growth, success and longevity of the business and all its parts. To truly understand how finance affects business it is important to gain knowledge and understanding of how the business generate revenue ,the cash flow of money that comes into the business, how bills are paid and money leaves the business and how investments are made in the business that can directly and indirectly impact the financial growth of the organization. In health care organizations there are different factors that come into play in the financial department…

    • 1082 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    SEC 402 Week 4 Assignment 1 – Developing the Corporate Strategy for Information Security – Strayer Latest…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7. List at least 3 risks your company will face, and explain how you will manage those risks.…

    • 309 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Protecting clients and company confidential information is of high importance, not only for the company and existing clients but also future clients.…

    • 270 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Contracts, policies and procedures will be put in place to ensure the safety of both the employees and the clients.…

    • 602 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Est1 Task 1

    • 1477 Words
    • 6 Pages

    Act in best interests of our clients. (Always safeguard our client’s information that is not public knowledge.)…

    • 1477 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 6 Assessment

    • 450 Words
    • 2 Pages

    5. What is the most important risk mitigation requirement you uncovered and want to communicate to executive management?…

    • 450 Words
    • 2 Pages
    Satisfactory Essays