SlideShare a Scribd company logo
1 of 5
ICT POLICIES
Ben Williams
Security
Policy
6.1.1 - If data is not stored
securely, there could be
consequences such as financial
costs, legal issues and loss of
reputation.
6.1.2 – Consider, when developing a
security policy, Protection, Detection &
Investigation of Misuse, Company
Procedures, staff Responsibility and
Discipline & Sanctions.
6.1.2.1 – Prevention takes account of
user that makes an accidental security
breach due to lack of training or general
incompetence and also deliberate
misuse caused by hacking or other
criminal activity.
6.1.2.2 – Serious damage can be avoided this
way. Network management personnel can
use manual methods to monitor the system.
Audit Trail software can be used to detect
abnormality.
6.1.2.3 – When misuse gets detected, it’s
important to do a full investigation. This
helps prevent further problems in future.
Can be internal misuse from an employee
meaning some form of discipline may be
required as well as further training.
6.1.2.4 – Physical Security, System
Access, Human Resource Issues,
Operational Procedures.
6.1.2.5 – E.g. System Admin could
be responsible for system backups
and would need to follow
procedures to ensure correct
timings, data content and location of
backup storage.
6.1.1.6 – Staff need to know about
sanctions they may receive based on
any misdemeanour, either deliberate
or accidental. Organisations needs to
take care when writing this as it has
to comply with current employment
legislation.
6.1.3 – Employees need to be aware
of how the security policy works
and affects them. Can be made alert
to security issues by: Training;
Communication; Legal Obligations.
Training
Policy
6.2.1 – Organisation needs to identify skills required
for each role in the company. Human resources
department would keep details of current roles of the
employees, academic qualifications and previous
training courses they have attended. All this info would
be co-ordinated to determine future training needed by
individuals, which would be reviewed regularly.
6.2.2 – Courses are often
short, intense and
expensive; some costing
£500 per day. Organisation
would keep full details of
various course providers
and quality of trainings
provided. Large
organisations have
thousands o employees to
train and invest in an in-
house training facility.
6.2.3 – Linked to training
budget, normally awarded on
annual basis. To be spent on
training, travel,
accommodation, meals.
6.2.4 - If employee is well
trained, they will make less
mistakes and be more
efficient. Meaning less money
spent on training and more on
physical components to make
the organisation greater.
Procurement
Policy
6.3.3 - Organisations consider
the disposal of their old
hardware as it is replaced with
more modern equipment and
consequently have produced a
policy to cover the issues.
6.3.2 - In projects, there are
budgets that have to be kept
within and many companies
are employing specialist
consultants to maximise their
purchasing efficiency.
6.3.1 - Funds can be saved by making sure that
the nessery ICT equipment or services are
delivered at the time they're needed and that
product cost is carefully negotiated. Employees
are responsible for different categories such as:
Hardware, Networking & Communication
Technology, Staff Services & Contract Labour,
Applications Software and System Software.
 Security Policy
6.1.1 – Why a Security Policy is
needed.
6.1.2 – Factors Considered in a
Security Policy.
6.1.2.1 – Prevention of Misuse.
6.1.2.2 – Detection of Misuse.
6.1.2.3 – Investigation of Misuse.
6.1.2.4 – Company Procedures.
6.1.2.5 – Staff Responsibility.
6.1.2.6 – Discipline & Sanctions.
 Training Policy
6.2.1 - Skill Requirements
6.2.2 - Course Structure &
Availability
6.2.3 - Financial Issues
6.2.4 - Cost Benefit
 Procurement Policy
6.3.1 - Procurement of
Equipment and Services
6.3.2 - ICT Procurement
Consultants
6.3.3 - Disposal of Equipment

More Related Content

What's hot

Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
Siddharth Janakiram
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
Apoorva Ajmani
 
Five steps to achieving hipaa compliance
Five steps to achieving hipaa complianceFive steps to achieving hipaa compliance
Five steps to achieving hipaa compliance
Anita Jones
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
StevenSegaert
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 
IT Professional Toolkit Slides
IT Professional Toolkit SlidesIT Professional Toolkit Slides
IT Professional Toolkit Slides
orourkep
 

What's hot (20)

IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
)k
)k)k
)k
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Sec4
Sec4Sec4
Sec4
 
Business continuity-plan-template
Business continuity-plan-templateBusiness continuity-plan-template
Business continuity-plan-template
 
Breach response
Breach responseBreach response
Breach response
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
 
Five steps to achieving hipaa compliance
Five steps to achieving hipaa complianceFive steps to achieving hipaa compliance
Five steps to achieving hipaa compliance
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkits
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
CISSP Online & Classroom Training & Certification Course - ievision.org
CISSP Online & Classroom Training & Certification Course - ievision.orgCISSP Online & Classroom Training & Certification Course - ievision.org
CISSP Online & Classroom Training & Certification Course - ievision.org
 
Information Systems Governance
Information Systems GovernanceInformation Systems Governance
Information Systems Governance
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset Management
 
IT Professional Toolkit Slides
IT Professional Toolkit SlidesIT Professional Toolkit Slides
IT Professional Toolkit Slides
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
 

Viewers also liked

Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
Erbol Digital
 
Drawbridge_MeetUp_June19_072414
Drawbridge_MeetUp_June19_072414Drawbridge_MeetUp_June19_072414
Drawbridge_MeetUp_June19_072414
Nitin Panjwani
 

Viewers also liked (12)

Gabriel agualongo
Gabriel  agualongoGabriel  agualongo
Gabriel agualongo
 
Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
 
ramashankar mishra rewa doar adiwasi sammelan
ramashankar mishra rewa doar adiwasi sammelanramashankar mishra rewa doar adiwasi sammelan
ramashankar mishra rewa doar adiwasi sammelan
 
Drawbridge_MeetUp_June19_072414
Drawbridge_MeetUp_June19_072414Drawbridge_MeetUp_June19_072414
Drawbridge_MeetUp_June19_072414
 
motores
motoresmotores
motores
 
Díptico
DípticoDíptico
Díptico
 
10 tendencias tecnológicas a seguir
10 tendencias tecnológicas a seguir10 tendencias tecnológicas a seguir
10 tendencias tecnológicas a seguir
 
Rackspace Valuation
Rackspace ValuationRackspace Valuation
Rackspace Valuation
 
La Educación finlandesa en síntesis
La Educación finlandesa en síntesisLa Educación finlandesa en síntesis
La Educación finlandesa en síntesis
 
Compansation determinant
Compansation determinantCompansation determinant
Compansation determinant
 
Redes Sociales en la Internacionalización de las Empresas
Redes Sociales en la Internacionalización de las EmpresasRedes Sociales en la Internacionalización de las Empresas
Redes Sociales en la Internacionalización de las Empresas
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 

Similar to A2 ICT Policies

This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
bikheet
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
Discover JKUAT
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w
SantosConleyha
 

Similar to A2 ICT Policies (20)

IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
 
Administrative support system
Administrative support systemAdministrative support system
Administrative support system
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
 
Importance of Information Security and Goals for Preventing Data Breaches
 Importance of Information Security and Goals for Preventing Data Breaches Importance of Information Security and Goals for Preventing Data Breaches
Importance of Information Security and Goals for Preventing Data Breaches
 
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCEBANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
 
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxFusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework
 
Management Control and Risk.pptx
Management Control and Risk.pptxManagement Control and Risk.pptx
Management Control and Risk.pptx
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w
 

Recently uploaded

原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 

Recently uploaded (20)

原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 

A2 ICT Policies

  • 2. Security Policy 6.1.1 - If data is not stored securely, there could be consequences such as financial costs, legal issues and loss of reputation. 6.1.2 – Consider, when developing a security policy, Protection, Detection & Investigation of Misuse, Company Procedures, staff Responsibility and Discipline & Sanctions. 6.1.2.1 – Prevention takes account of user that makes an accidental security breach due to lack of training or general incompetence and also deliberate misuse caused by hacking or other criminal activity. 6.1.2.2 – Serious damage can be avoided this way. Network management personnel can use manual methods to monitor the system. Audit Trail software can be used to detect abnormality. 6.1.2.3 – When misuse gets detected, it’s important to do a full investigation. This helps prevent further problems in future. Can be internal misuse from an employee meaning some form of discipline may be required as well as further training. 6.1.2.4 – Physical Security, System Access, Human Resource Issues, Operational Procedures. 6.1.2.5 – E.g. System Admin could be responsible for system backups and would need to follow procedures to ensure correct timings, data content and location of backup storage. 6.1.1.6 – Staff need to know about sanctions they may receive based on any misdemeanour, either deliberate or accidental. Organisations needs to take care when writing this as it has to comply with current employment legislation. 6.1.3 – Employees need to be aware of how the security policy works and affects them. Can be made alert to security issues by: Training; Communication; Legal Obligations.
  • 3. Training Policy 6.2.1 – Organisation needs to identify skills required for each role in the company. Human resources department would keep details of current roles of the employees, academic qualifications and previous training courses they have attended. All this info would be co-ordinated to determine future training needed by individuals, which would be reviewed regularly. 6.2.2 – Courses are often short, intense and expensive; some costing £500 per day. Organisation would keep full details of various course providers and quality of trainings provided. Large organisations have thousands o employees to train and invest in an in- house training facility. 6.2.3 – Linked to training budget, normally awarded on annual basis. To be spent on training, travel, accommodation, meals. 6.2.4 - If employee is well trained, they will make less mistakes and be more efficient. Meaning less money spent on training and more on physical components to make the organisation greater.
  • 4. Procurement Policy 6.3.3 - Organisations consider the disposal of their old hardware as it is replaced with more modern equipment and consequently have produced a policy to cover the issues. 6.3.2 - In projects, there are budgets that have to be kept within and many companies are employing specialist consultants to maximise their purchasing efficiency. 6.3.1 - Funds can be saved by making sure that the nessery ICT equipment or services are delivered at the time they're needed and that product cost is carefully negotiated. Employees are responsible for different categories such as: Hardware, Networking & Communication Technology, Staff Services & Contract Labour, Applications Software and System Software.
  • 5.  Security Policy 6.1.1 – Why a Security Policy is needed. 6.1.2 – Factors Considered in a Security Policy. 6.1.2.1 – Prevention of Misuse. 6.1.2.2 – Detection of Misuse. 6.1.2.3 – Investigation of Misuse. 6.1.2.4 – Company Procedures. 6.1.2.5 – Staff Responsibility. 6.1.2.6 – Discipline & Sanctions.  Training Policy 6.2.1 - Skill Requirements 6.2.2 - Course Structure & Availability 6.2.3 - Financial Issues 6.2.4 - Cost Benefit  Procurement Policy 6.3.1 - Procurement of Equipment and Services 6.3.2 - ICT Procurement Consultants 6.3.3 - Disposal of Equipment