ABSTRACT

Every staff position that interacts with the computer system should be evaluated from a security perspective. Establish criteria for filling each position; spell out the process to be used to evaluate candidates, screen applicants, and conduct background checks. Specify the training program for new employees.