Running Head: Project Preparation Security Program Charter 1
Running Head: Project Preparation Security Program Charter 1
Justin R. Cook
The purpose of this Security Program Charter is to set the high-level purpose and scope of HIC
Inc.’s security program. Additionally, this charter outlines the ownership and responsibilities of
those tasked with overseeing the overall security program, implementing policies, and complying
with procedures.
I. Scope
This Information Security Program Charter and all resulting documentation apply to all HIC Inc.
members including employees, contractors, consultants, and any individual/entity authorized to
use and/or access HIC Inc.’s resources, data, and systems.
II. Information Security Program Mission Statement
The HIC Inc. Information Security Program will take a proactive approach to implement a well-
vetted security program that leverages federal standards to address security risks across all
business functions.
The Information Security Program will safeguard the confidentiality of systems and data by
developing policies to implement several layers of security into all systems. Security will be
integrated into information systems during each step of their development lifecycle. Users will
only be granted access to these systems and the information stored on them if it is required to
fulfill their business functions.
The Information Security Program will safeguard the availability of all systems and data by
developing policies that require implementing redundant systems and adhering to a strict backup
schedule. Systems will be redundant at all levels including power, network, storage, and compute
resources. All critical systems will be subject to regular backups that satisfy the RTOs and RPOs
dictated by executive management.
Running head: Project Preparation Security Program Charter 3
The Information Security Program will integrate federally accepted standards into all policies
subject to the Security Program Charter. HIC Inc. will regularly check for compliance against
these standards and apply updates to all systems as required.
III. Ownership and Responsibilities
All members of the HIC Inc. organization have the responsibility to do their due diligence to help
ensure the security of all information and systems. Each layer of the security program is vital to
the overall security of the entire company. A security program is only successful if all users
follow the policies, procedures, and guidelines laid out.
The Chief Executive Officer (CEO) must approve the HIC Inc. Information Security Program
Charter. The CEO additionally assigns executive ownership and authority for the HIC Inc.
Security Program to the Chief Information Security Officer (CISO). The CISO leads an
information security team that works together to develop the policies that are a part of the overall
security program. Following the development of security policies, the CISO must then evaluate
and approve each policy.
The information security team works closely with department managers to implement the
security policies into their daily procedures and systems. The department managers ensure that
their employees are aware of and follow the policies in the security program. All employees,
contractors, consultants, and any individual/entity authorized to use and/or access HIC Inc.’s
resources, data, and systems are responsible for following the policies.
IV. Enforcement and Exception Handling
Failure to comply with HIC Inc.’s security policies or procedures will result in disciplinary
actions which can include termination of employment or termination of contracts/agreements.
Serious offenses that violate legal regulations may also result in lawsuits.
Exceptions to the HIC Inc. security program are granted under extremely rare circumstances.
Any potential exception will be documented, approved, and signed by the CEO of HIC Inc.
performed on this document. Following the edits, the Security Program Charter must be
approved by the CEO again.
Approved: __________________________________________
Signature
<Typed Name>
Chief Executive Officer