Explore BrainMass
Share

Explore BrainMass

    Security Policies in Organizations

    This content was COPIED from BrainMass.com - View the original, and get the already-completed solution here!

    Taking care of information falls to those who own the information to develop ethical guidelines about how to manage it. Treating sensitive corporate information as a valuable resource is good management. Building a corporate culture based on ethical principles that employees can understand and implement is responsible management. Organizations should develop written policies establishing employee guidelines, procedures, and organizational rules for information.

    In your paper, be sure to include:

    - What are security policies or e-policies?
    - Explain three security policies that you would primarily recommend to an organization to have as a minimum and why?
    - How security policies should be implemented in organizations?

    © BrainMass Inc. brainmass.com October 10, 2019, 5:49 am ad1c9bdddf
    https://brainmass.com/business/management-information-systems/security-policies-in-organizations-518722

    Solution Preview

    Here is how I would structure each part of your paper, and the main content that should be addressed. Links are included for further expansion in each area also, to assist you in writing your paper.

    - What are security policies or e-policies?

    The security policies set the foundation for the activities directly related to information systems within the organization. The security policies affect every level of management and all employees within the organization. The security policy or policies must be written comprehensively, and must take into account the jobs, activities, events, and other factors that make up the actual information systems throughout the organization. It is only when each element is well-defined and understood, that an effective security policy can be written. When we write a security policy, we ensure that it includes all main and secondary elements that are needed. We can't stress enough the fact that it must be comprehensive. This is due to the fact that when it's not comprehensive, employees find loopholes, unsecured areas, and other ways to access data that certain employees have no rights to accessing. By having a comprehensive policy, it also works to ensure that customer data, employee data, proprietary information, and all other information is safeguarded to the most reasonable extent possible. This is the most ethical approach to security policy creation.

    One of the main factors that goes hand-in-hand with policy creation in any organization and involving any topic, whether it's security, organization, risk management, etc. is the corporate culture. The corporate culture must be based on an appropriate framework. If an organization develops a security policy based on the appropriate corporate culture, the security policy/policies have the highest chances for overall success with low failure rates. If a company creates a comprehensive security policy but does not have the corporate culture designed in a way that is proactive to supporting and ...

    Solution Summary

    This solution explains security policies or e-policies, policies that should be recommended to an organization, and how the policies should be implemented.

    $2.19