Cyber Law and Policy: Lesson 6 Information Security Policies
Cyber Law and Policy: Lesson 6 Information Security Policies
Lesson 6
Information security policies
Objectives
• Upon completion of this material you should be able to:
– Define information security policy and understand its central role in
a successful information security program
– Describe the three major types of information security policy and
explain what goes into each type
– Develop, implement, and maintain various types of information
security policies
Introduction
• Policy is the essential foundation of an effective
information security program
– “The success of an information resources protection program
depends on the policy generated, and on the attitude of
management toward securing information on automated systems”
• Policy maker sets the tone and emphasis on the
importance of information security
Introduction (cont’d.)
• Policy objectives
– Reduced risk
– Compliance with laws and regulations
– Assurance of operational continuity, information integrity, and
confidentiality
Why Policy?
• A quality information security program begins and ends
with policy
• Policies are the least expensive means of control and
often the most difficult to implement
• Basic rules for shaping a policy
– Policy should never conflict with law
– Policy must be able to stand up in court if challenged
– Policy must be properly supported and administered
Why Policy? (cont’d.)