ABSTRACT

Here‘s your how-to manual for developing policies and procedures that maintain the security of information systems and networks in the workplace. It provides numerous checklists and examples of existing programs that you can use as guidelines for creating your own documents.



You‘ll learn how to identify your company‘s overall

chapter 1|20 pages

Policy Statement

chapter 2|16 pages

Mission Statement

chapter 3|24 pages

Data Classification

chapter 4|34 pages

Volume Contents

chapter 5|8 pages

Review Panel

chapter 6|28 pages

Selling the Program

chapter 7|12 pages

Employee Awareness Program

chapter 8|8 pages

Monitoring Compliance

chapter 9|6 pages

Computer and Information Security Laws