SlideShare a Scribd company logo
1 of 5
ICT POLICIES
Ben Williams
Security
Policy
6.1.1 - If data is not stored
securely, there could be
consequences such as financial
costs, legal issues and loss of
reputation.
6.1.2 – Consider, when developing a
security policy, Protection, Detection &
Investigation of Misuse, Company
Procedures, staff Responsibility and
Discipline & Sanctions.
6.1.2.1 – Prevention takes account of
user that makes an accidental security
breach due to lack of training or general
incompetence and also deliberate
misuse caused by hacking or other
criminal activity.
6.1.2.2 – Serious damage can be avoided this
way. Network management personnel can
use manual methods to monitor the system.
Audit Trail software can be used to detect
abnormality.
6.1.2.3 – When misuse gets detected, it’s
important to do a full investigation. This
helps prevent further problems in future.
Can be internal misuse from an employee
meaning some form of discipline may be
required as well as further training.
6.1.2.4 – Physical Security, System
Access, Human Resource Issues,
Operational Procedures.
6.1.2.5 – E.g. System Admin could
be responsible for system backups
and would need to follow
procedures to ensure correct
timings, data content and location of
backup storage.
6.1.1.6 – Staff need to know about
sanctions they may receive based on
any misdemeanour, either deliberate
or accidental. Organisations needs to
take care when writing this as it has
to comply with current employment
legislation.
6.1.3 – Employees need to be aware
of how the security policy works
and affects them. Can be made alert
to security issues by: Training;
Communication; Legal Obligations.
Training
Policy
6.2.1 – Organisation needs to identify skills required
for each role in the company. Human resources
department would keep details of current roles of the
employees, academic qualifications and previous
training courses they have attended. All this info would
be co-ordinated to determine future training needed by
individuals, which would be reviewed regularly.
6.2.2 – Courses are often
short, intense and
expensive; some costing
£500 per day. Organisation
would keep full details of
various course providers
and quality of trainings
provided. Large
organisations have
thousands o employees to
train and invest in an in-
house training facility.
6.2.3 – Linked to training
budget, normally awarded on
annual basis. To be spent on
training, travel,
accommodation, meals.
6.2.4 - If employee is well
trained, they will make less
mistakes and be more
efficient. Meaning less money
spent on training and more on
physical components to make
the organisation greater.
Procurement
Policy
6.3.3 - Organisations consider
the disposal of their old
hardware as it is replaced with
more modern equipment and
consequently have produced a
policy to cover the issues.
6.3.2 - In projects, there are
budgets that have to be kept
within and many companies
are employing specialist
consultants to maximise their
purchasing efficiency.
6.3.1 - Funds can be saved by making sure that
the nessery ICT equipment or services are
delivered at the time they're needed and that
product cost is carefully negotiated. Employees
are responsible for different categories such as:
Hardware, Networking & Communication
Technology, Staff Services & Contract Labour,
Applications Software and System Software.
 Security Policy
6.1.1 – Why a Security Policy is
needed.
6.1.2 – Factors Considered in a
Security Policy.
6.1.2.1 – Prevention of Misuse.
6.1.2.2 – Detection of Misuse.
6.1.2.3 – Investigation of Misuse.
6.1.2.4 – Company Procedures.
6.1.2.5 – Staff Responsibility.
6.1.2.6 – Discipline & Sanctions.
 Training Policy
6.2.1 - Skill Requirements
6.2.2 - Course Structure &
Availability
6.2.3 - Financial Issues
6.2.4 - Cost Benefit
 Procurement Policy
6.3.1 - Procurement of
Equipment and Services
6.3.2 - ICT Procurement
Consultants
6.3.3 - Disposal of Equipment

More Related Content

What's hot

IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System SecurityCSSRL PUNE
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
 
Business continuity-plan-template
Business continuity-plan-templateBusiness continuity-plan-template
Business continuity-plan-templateMohamed Owaish
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Apoorva Ajmani
 
Five steps to achieving hipaa compliance
Five steps to achieving hipaa complianceFive steps to achieving hipaa compliance
Five steps to achieving hipaa complianceAnita Jones
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and proceduresStevenSegaert
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkitsIT-Toolkits.org
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
CISSP Online & Classroom Training & Certification Course - ievision.org
CISSP Online & Classroom Training & Certification Course - ievision.orgCISSP Online & Classroom Training & Certification Course - ievision.org
CISSP Online & Classroom Training & Certification Course - ievision.orgIEVISION IT SERVICES Pvt. Ltd
 
Information Systems Governance
Information Systems GovernanceInformation Systems Governance
Information Systems GovernanceMark Roman
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset ManagementNada G.Youssef
 
IT Professional Toolkit Slides
IT Professional Toolkit SlidesIT Professional Toolkit Slides
IT Professional Toolkit Slidesorourkep
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityNada G.Youssef
 

What's hot (20)

IT governance and Information System Security
IT governance and Information System SecurityIT governance and Information System Security
IT governance and Information System Security
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
)k
)k)k
)k
 
Aetna information security assurance program
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance program
 
Sec4
Sec4Sec4
Sec4
 
Business continuity-plan-template
Business continuity-plan-templateBusiness continuity-plan-template
Business continuity-plan-template
 
Breach response
Breach responseBreach response
Breach response
 
Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206Enterprise Information Security Architecture_Paper_1206
Enterprise Information Security Architecture_Paper_1206
 
Five steps to achieving hipaa compliance
Five steps to achieving hipaa complianceFive steps to achieving hipaa compliance
Five steps to achieving hipaa compliance
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
 
The benefits of technology standards it-toolkits
The benefits of technology standards   it-toolkitsThe benefits of technology standards   it-toolkits
The benefits of technology standards it-toolkits
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
CISSP Online & Classroom Training & Certification Course - ievision.org
CISSP Online & Classroom Training & Certification Course - ievision.orgCISSP Online & Classroom Training & Certification Course - ievision.org
CISSP Online & Classroom Training & Certification Course - ievision.org
 
Information Systems Governance
Information Systems GovernanceInformation Systems Governance
Information Systems Governance
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset Management
 
IT Professional Toolkit Slides
IT Professional Toolkit SlidesIT Professional Toolkit Slides
IT Professional Toolkit Slides
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
 

Viewers also liked

Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...Erbol Digital
 
ramashankar mishra rewa doar adiwasi sammelan
ramashankar mishra rewa doar adiwasi sammelanramashankar mishra rewa doar adiwasi sammelan
ramashankar mishra rewa doar adiwasi sammelanYograj Tiwari
 
Drawbridge_MeetUp_June19_072414
Drawbridge_MeetUp_June19_072414Drawbridge_MeetUp_June19_072414
Drawbridge_MeetUp_June19_072414Nitin Panjwani
 
10 tendencias tecnológicas a seguir
10 tendencias tecnológicas a seguir10 tendencias tecnológicas a seguir
10 tendencias tecnológicas a seguirAlfredo Vela Zancada
 
La Educación finlandesa en síntesis
La Educación finlandesa en síntesisLa Educación finlandesa en síntesis
La Educación finlandesa en síntesisAlfredo Vela Zancada
 
Compansation determinant
Compansation determinantCompansation determinant
Compansation determinantMis bah
 
Redes Sociales en la Internacionalización de las Empresas
Redes Sociales en la Internacionalización de las EmpresasRedes Sociales en la Internacionalización de las Empresas
Redes Sociales en la Internacionalización de las EmpresasAlfredo Vela Zancada
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2GennaroBonito
 

Viewers also liked (12)

Gabriel agualongo
Gabriel  agualongoGabriel  agualongo
Gabriel agualongo
 
Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
Bolivia importacion depreparaciones quimicas anticonceptivas a base de hormon...
 
ramashankar mishra rewa doar adiwasi sammelan
ramashankar mishra rewa doar adiwasi sammelanramashankar mishra rewa doar adiwasi sammelan
ramashankar mishra rewa doar adiwasi sammelan
 
Drawbridge_MeetUp_June19_072414
Drawbridge_MeetUp_June19_072414Drawbridge_MeetUp_June19_072414
Drawbridge_MeetUp_June19_072414
 
motores
motoresmotores
motores
 
Díptico
DípticoDíptico
Díptico
 
10 tendencias tecnológicas a seguir
10 tendencias tecnológicas a seguir10 tendencias tecnológicas a seguir
10 tendencias tecnológicas a seguir
 
Rackspace Valuation
Rackspace ValuationRackspace Valuation
Rackspace Valuation
 
La Educación finlandesa en síntesis
La Educación finlandesa en síntesisLa Educación finlandesa en síntesis
La Educación finlandesa en síntesis
 
Compansation determinant
Compansation determinantCompansation determinant
Compansation determinant
 
Redes Sociales en la Internacionalización de las Empresas
Redes Sociales en la Internacionalización de las EmpresasRedes Sociales en la Internacionalización de las Empresas
Redes Sociales en la Internacionalización de las Empresas
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 

Similar to A2 ICT Policies

A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...bikheet
 
Administrative support system
Administrative support systemAdministrative support system
Administrative support systemJoyAnn7
 
Importance of Information Security and Goals for Preventing Data Breaches
 Importance of Information Security and Goals for Preventing Data Breaches Importance of Information Security and Goals for Preventing Data Breaches
Importance of Information Security and Goals for Preventing Data Breacheskimsrung lov
 
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCEBANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCEPARAMASIVANCHELLIAH
 
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...Feroot
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09Tammy Clark
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSShivamSharma909
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrainInfosecTrain
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr WafulaDiscover JKUAT
 
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxFusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxMuhammadAbdullah311866
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework- Mark - Fullbright
 
Management Control and Risk.pptx
Management Control and Risk.pptxManagement Control and Risk.pptx
Management Control and Risk.pptxSuku Thomas Samuel
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of wSantosConleyha
 

Similar to A2 ICT Policies (20)

IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
 
Administrative support system
Administrative support systemAdministrative support system
Administrative support system
 
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
PACE-IT, Security+ 2.1: Risk Related Concepts (part 1)
 
Importance of Information Security and Goals for Preventing Data Breaches
 Importance of Information Security and Goals for Preventing Data Breaches Importance of Information Security and Goals for Preventing Data Breaches
Importance of Information Security and Goals for Preventing Data Breaches
 
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCEBANKING INTELLIGENCE THROUGH ARTIFICIAL  INTELLIGENCE
BANKING INTELLIGENCE THROUGH ARTIFICIAL INTELLIGENCE
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
 
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
Feroot Smart Technology Privacy Summit: Fiduciary Finesse & Cybersecurity — W...
 
RBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on ITRBI Gopalakrishna Committee Report on IT
RBI Gopalakrishna Committee Report on IT
 
Supplement To Student Guide Seminar 03 A 3 Nov09
Supplement To Student Guide   Seminar 03 A 3 Nov09Supplement To Student Guide   Seminar 03 A 3 Nov09
Supplement To Student Guide Seminar 03 A 3 Nov09
 
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMSCISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
CISA Domain 1 The Process On AUDITING INFORMATION SYSTEMS
 
CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Information Security Management Systems(ISMS) By Dr Wafula
Information Security Management Systems(ISMS) By Dr  WafulaInformation Security Management Systems(ISMS) By Dr  Wafula
Information Security Management Systems(ISMS) By Dr Wafula
 
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptxFusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
Fusion-Center-ITS-Security-and-Privacy-Operations (1).pptx
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework
 
Management Control and Risk.pptx
Management Control and Risk.pptxManagement Control and Risk.pptx
Management Control and Risk.pptx
 
1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w1. Project Description Definition of ProjectThe supervision of w
1. Project Description Definition of ProjectThe supervision of w
 

Recently uploaded

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 

Recently uploaded (11)

ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 

A2 ICT Policies

  • 2. Security Policy 6.1.1 - If data is not stored securely, there could be consequences such as financial costs, legal issues and loss of reputation. 6.1.2 – Consider, when developing a security policy, Protection, Detection & Investigation of Misuse, Company Procedures, staff Responsibility and Discipline & Sanctions. 6.1.2.1 – Prevention takes account of user that makes an accidental security breach due to lack of training or general incompetence and also deliberate misuse caused by hacking or other criminal activity. 6.1.2.2 – Serious damage can be avoided this way. Network management personnel can use manual methods to monitor the system. Audit Trail software can be used to detect abnormality. 6.1.2.3 – When misuse gets detected, it’s important to do a full investigation. This helps prevent further problems in future. Can be internal misuse from an employee meaning some form of discipline may be required as well as further training. 6.1.2.4 – Physical Security, System Access, Human Resource Issues, Operational Procedures. 6.1.2.5 – E.g. System Admin could be responsible for system backups and would need to follow procedures to ensure correct timings, data content and location of backup storage. 6.1.1.6 – Staff need to know about sanctions they may receive based on any misdemeanour, either deliberate or accidental. Organisations needs to take care when writing this as it has to comply with current employment legislation. 6.1.3 – Employees need to be aware of how the security policy works and affects them. Can be made alert to security issues by: Training; Communication; Legal Obligations.
  • 3. Training Policy 6.2.1 – Organisation needs to identify skills required for each role in the company. Human resources department would keep details of current roles of the employees, academic qualifications and previous training courses they have attended. All this info would be co-ordinated to determine future training needed by individuals, which would be reviewed regularly. 6.2.2 – Courses are often short, intense and expensive; some costing £500 per day. Organisation would keep full details of various course providers and quality of trainings provided. Large organisations have thousands o employees to train and invest in an in- house training facility. 6.2.3 – Linked to training budget, normally awarded on annual basis. To be spent on training, travel, accommodation, meals. 6.2.4 - If employee is well trained, they will make less mistakes and be more efficient. Meaning less money spent on training and more on physical components to make the organisation greater.
  • 4. Procurement Policy 6.3.3 - Organisations consider the disposal of their old hardware as it is replaced with more modern equipment and consequently have produced a policy to cover the issues. 6.3.2 - In projects, there are budgets that have to be kept within and many companies are employing specialist consultants to maximise their purchasing efficiency. 6.3.1 - Funds can be saved by making sure that the nessery ICT equipment or services are delivered at the time they're needed and that product cost is carefully negotiated. Employees are responsible for different categories such as: Hardware, Networking & Communication Technology, Staff Services & Contract Labour, Applications Software and System Software.
  • 5.  Security Policy 6.1.1 – Why a Security Policy is needed. 6.1.2 – Factors Considered in a Security Policy. 6.1.2.1 – Prevention of Misuse. 6.1.2.2 – Detection of Misuse. 6.1.2.3 – Investigation of Misuse. 6.1.2.4 – Company Procedures. 6.1.2.5 – Staff Responsibility. 6.1.2.6 – Discipline & Sanctions.  Training Policy 6.2.1 - Skill Requirements 6.2.2 - Course Structure & Availability 6.2.3 - Financial Issues 6.2.4 - Cost Benefit  Procurement Policy 6.3.1 - Procurement of Equipment and Services 6.3.2 - ICT Procurement Consultants 6.3.3 - Disposal of Equipment