P4
Policies
>
Policies 2
>
Updating security policies
>
Code of Conduct
>
Surveillance and monitoring policies
>
Risk Management
>
Budget settings
>
Conclusion
P5
Employment contract & College technologies
>
Hiring policy
>
Separation of duties
>
Disciplinary procedures
>
Training and communication
P6
Computer misuse act (1990)
>
Copy design and patents Act (1988)
>
Data Protection Acts of (1984, 1998 & 2000)
>
Freedom of information act (2000)
>
Real life example
P4, P5 & P6
P4: Explain the policies and guidelines for managing organisational IT security issues
By Yi Jun Lin
begin
Introduction:
In this website I am going to talk about the acceptable use policy - general use and ownership, disaster recovery policy and security procedures.