SlideShare a Scribd company logo
2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org
http://it-toolkits.org/blog/?p=74 1/4
Fundamentals of Data Security Policy in I.T.
Management - IT-Toolkits.org
We all know that I.T. stands for “information technology” and that’s no accident. In fact, it’s a
reflection of the primary mission of every I.T. organization – to provide the means and methods for
creating, storing, transmitting, printing and retrieving business related information. By design, this
operational mission is driven by the need to “protect”, which also includes preventing unauthorized
access, uncontrolled modification and unwarranted destruction. The priorities are self evident – data
integrity is vital, and vital needs must be met with purpose and committment. The tricky part is to
balance vital interests with the associated costs and operational overhead. This is the higher
purpose of data security and the goal of related policy development.
Data Security Practices and Policy Purpose
As discussed, “data security” provides the means by which business data and related information is
protected and preserved. This is realized in multiple ways, as listed below:
Data security technology and practices provide the means by which data can be safely created,
stored, transmitted, printed and retrieved.
Data security technology and practices provide the means by which data accuracy and integrity is
ensured and maintained.
Data security technology and practices provide the means to prevent and control unauthorized
access, modification and destruction.
Data security technology and practices provide the opportunity to minimize the risks and costs
associated with data loss, data corruption and unauthorized access.
Of course, the physical means of “securing data” are essential to the process. You must have the
technical ability (through hardware and software) to physically meet each of the above listed
objectives. But that will only take you part of the way. To realize all of the intended benefits,
data security practices must be “institutionalized” – i.e. integrated into the corporate
culture and made part of how a given organization works. This is achieved through the
2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org
http://it-toolkits.org/blog/?p=74 2/4
development and implementation of effective “data security policy”. Policy is a governance
mechanism, used to translate tangible security objectives into organizational terms that can be
implemented and enforced. In the case of data security, related policies provide the “how, what, and
why” to communicate security objectives and promote expected compliance.
To fulfill this mission, data security policy must be developed and documented to reflect the following
components and answer the underlying formative questions:
Policy Purpose
What are the specific goals of this data security policy?
Why has the policy been created (considering the background events leading to policy
development)?
What will the policy accomplish considering data security goals and objectives?
Policy Basis
What is the underlying authority and/or organizational basis for this data security policy
(considering internal guidelines and/or external regulatory requirements)?
Do you have sufficient executive support to sufficiently enforce compliance with all of the policy
provisions?
Policy Scope
What are the organizational targets of the policy considering company-wide applicability,
division specific application, departmental application or location specific application?
What are the data targets of the policy considering the types of files, records, information and
applications covered by the policy?
Policy Stakeholders
Who are the policy stakeholders considering both individuals and groups who have a vested
interest in the policy and ability to influence the outcome?
What are the specific roles and responsibilities required to implement, administer and enforce
all policy terms, including all stated compliance obligations?
Security Means and Methods
What are the means and methods to be utilized to realize all identified data security
requirements, including data encryption, data access restrictions, security monitoring, data
classifications, userid requirements, password requirements, data storage mechanisms, and
related matters?
Compliance and Enforcement Guidelines
What are established guidelines for data security compliance?
Will there be any exceptions and/or waivers with regard to policy compliance? If so, what are
the terms under which exceptions and/or waivers will be granted?
How will compliance be enforced and what are the consequences for a failure to comply?
How will employees be provided with training relating to data security compliance?
2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org
http://it-toolkits.org/blog/?p=74 3/4
What types of auditing procedures will be used to monitor and promote data security
compliance?
Take an Inclusive Approach to Policy Development
Every data security policy will benefit from an inclusive approach to development and implementation.
It takes a partnership between all of the interested and invested stakeholders to fully realize policy
relevance and enforcement. In the collaborative approach, the end-user partner defines the need
(the data to be protected and the business basis behind the security requirements). The IT partner
provides the technical means (and capability) by which the identified data security needs can be met.
These needs and means are then combined to form actionable policy through an “inclusive”
development process, characterized by input and collaboration at every stage:
Policy planning relies on input and information relating to data security needs and policy
objectives.
Policy preparation relies on the review of policy drafts, negotiation, and feedback relating to
specific terms and related obligations,
Policy implementation relies on the documented acceptance (and approval) of policy terms and
compliance obligations on the part of decision making stakeholders.
As policy development unfolds, checkpoints should be established to ensure that all decision making
stakeholders have been sufficiently engaged in the development process. Considering the long term
benefits of collaborative policy development (compliance is more readily secured when you have
advance buy-in), it’s always a good idea to create a “policy team” or committee as the organizational
vehicle for policy development. This policy team or committee should include members from all sides
– the end-user community, IT department, Legal department, Human Resources and any other
appropriate department with something to contribute. This will help to ensure that the policy delivered
represents all interests, incorporates all concerns, and has the greatest chance to succeed.
You may also like
2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org
http://it-toolkits.org/blog/?p=74 4/4

More Related Content

PDF
Protecting business interests with policies for it asset management it-tool...
PDF
The benefits of technology standards it-toolkits
PPT
2009 iapp-the corpprivacydeptmar13-2009
PDF
Information security policy how to writing
DOC
Challenges in implementing effective data security practices
PPTX
Information classification
PPTX
Information Security Governance and Strategy - 3
PPTX
Resume: The Complete Guide to Cybersecurity Risks and Controls
Protecting business interests with policies for it asset management it-tool...
The benefits of technology standards it-toolkits
2009 iapp-the corpprivacydeptmar13-2009
Information security policy how to writing
Challenges in implementing effective data security practices
Information classification
Information Security Governance and Strategy - 3
Resume: The Complete Guide to Cybersecurity Risks and Controls

What's hot (20)

DOCX
Final Exam Case Study (3)
PPTX
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
PPTX
Information Governance Program
PPT
Information security policy_2011
PPT
Information security
PDF
SME- Developing an information governance strategy 2016
PPTX
Legal-Ethical-Professionalin-IS.pptx
PPT
Chapter 5 Planning for Security-students.ppt
PPT
Lesson 1 - Introduction
PPTX
Establishing an information governance program
PPTX
Mandelaris_SecureWorld_2016_FINAL
PDF
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
PPTX
PDF
IT6701 Information Management Unit - V
PDF
Sheila Jeffrey - Well Behaved Data - It's a Matter of Principles
PPTX
An Introduction to the General Data Protection Regulation (GDPR)
PDF
IT Architecture’s Role In Solving Technical Debt.pdf
PPTX
SMBs - Hierarchy of Business-Security Documents 2015-11
Final Exam Case Study (3)
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Information Governance Program
Information security policy_2011
Information security
SME- Developing an information governance strategy 2016
Legal-Ethical-Professionalin-IS.pptx
Chapter 5 Planning for Security-students.ppt
Lesson 1 - Introduction
Establishing an information governance program
Mandelaris_SecureWorld_2016_FINAL
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
IT6701 Information Management Unit - V
Sheila Jeffrey - Well Behaved Data - It's a Matter of Principles
An Introduction to the General Data Protection Regulation (GDPR)
IT Architecture’s Role In Solving Technical Debt.pdf
SMBs - Hierarchy of Business-Security Documents 2015-11
Ad

Viewers also liked (11)

PPT
Lecture1
PPTX
Personal Information Collection: A Trade-Off Analysis
PDF
Legal issues Text and Data Mining
PDF
Big Data Mining - Classification, Techniques and Issues
PDF
Presentation from ALA Midwinter 2014 on Elsevier's new Text and Data Mining P...
PPT
Merit Event - Understanding and Managing Data Protection
PPTX
A business driven approach to security policy management a technical perspec...
PPT
1.3 applications, issues
PPTX
Major issues in data mining
PPT
Data security in local network using distributed firewall ppt
PDF
Data mining (lecture 1 & 2) conecpts and techniques
Lecture1
Personal Information Collection: A Trade-Off Analysis
Legal issues Text and Data Mining
Big Data Mining - Classification, Techniques and Issues
Presentation from ALA Midwinter 2014 on Elsevier's new Text and Data Mining P...
Merit Event - Understanding and Managing Data Protection
A business driven approach to security policy management a technical perspec...
1.3 applications, issues
Major issues in data mining
Data security in local network using distributed firewall ppt
Data mining (lecture 1 & 2) conecpts and techniques
Ad

Similar to Fundamentals of data security policy in i.t. management it-toolkits (20)

PPTX
Policy Writing (1).pptx for the ISMS and risk assessment GRC
PPT
Policy Management: An Overview
PDF
For our discussion question, we focus on recent trends in security t.pdf
PDF
How to write your company's it security policy it-toolkits
PPTX
Community IT - Crafting Nonprofit IT Security Policy
PDF
Security policy.pdf
PPT
3.5 ICT Policies
PPT
Policy-1.pptznlaldjwodmwlznalpqjdc ktpanV
PDF
Why do you need an it policy it-toolkits
PPT
Information security policy_2011
PPTX
12 security policies
PPT
develop security policy
PPTX
Building The Framework For A Culture Of Security
DOCX
Security Policies and Implementation IssuesLecture 5How to D.docx
PPTX
Importance Of A Security Policy
PPTX
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PDF
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
DOCX
CHAPTER 5 Security Policies, Standards, Procedures, a
DOCX
CHAPTER 5Information Security Policy Implementation Issues
Policy Writing (1).pptx for the ISMS and risk assessment GRC
Policy Management: An Overview
For our discussion question, we focus on recent trends in security t.pdf
How to write your company's it security policy it-toolkits
Community IT - Crafting Nonprofit IT Security Policy
Security policy.pdf
3.5 ICT Policies
Policy-1.pptznlaldjwodmwlznalpqjdc ktpanV
Why do you need an it policy it-toolkits
Information security policy_2011
12 security policies
develop security policy
Building The Framework For A Culture Of Security
Security Policies and Implementation IssuesLecture 5How to D.docx
Importance Of A Security Policy
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER 5Information Security Policy Implementation Issues

More from IT-Toolkits.org (20)

PDF
Risk Management & Information Security Management Systems
PDF
Information Technology & Its Role in the Modern Organization
PDF
It Organization Management : Revisiting Centralization
PDF
It change management
DOCX
P2 how to develop an it change management program
PDF
25 important considerations for selecting new customer support tools
PDF
10 security problems unique to it
PDF
10 security problems unique to it
PDF
The basics of managing i.t
PDF
It management audits it management templates
PDF
What is value added- it management_ - it management templates
PDF
7 steps to business and it alignment it management templates
PDF
Relevant it – it solutions to bridge the gap between business and it it man...
PDF
Finding a common ground between finance and it it management templates
PDF
Email policies tools to govern usage, access and etiquette it-toolkits
PDF
Help desk ticket categories create help desk ticket classification it-tool...
PDF
Help desk mission and vision statements. it-toolkits
PDF
Help desk problem management it-toolkits
PDF
Help desk kpi it-toolkits
PDF
It help desk what is a help desk - it-toolkits
Risk Management & Information Security Management Systems
Information Technology & Its Role in the Modern Organization
It Organization Management : Revisiting Centralization
It change management
P2 how to develop an it change management program
25 important considerations for selecting new customer support tools
10 security problems unique to it
10 security problems unique to it
The basics of managing i.t
It management audits it management templates
What is value added- it management_ - it management templates
7 steps to business and it alignment it management templates
Relevant it – it solutions to bridge the gap between business and it it man...
Finding a common ground between finance and it it management templates
Email policies tools to govern usage, access and etiquette it-toolkits
Help desk ticket categories create help desk ticket classification it-tool...
Help desk mission and vision statements. it-toolkits
Help desk problem management it-toolkits
Help desk kpi it-toolkits
It help desk what is a help desk - it-toolkits

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Cloud computing and distributed systems.
PDF
KodekX | Application Modernization Development
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectral efficient network and resource selection model in 5G networks
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectroscopy.pptx food analysis technology
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
Cloud computing and distributed systems.
KodekX | Application Modernization Development
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Fundamentals of data security policy in i.t. management it-toolkits

  • 1. 2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org http://it-toolkits.org/blog/?p=74 1/4 Fundamentals of Data Security Policy in I.T. Management - IT-Toolkits.org We all know that I.T. stands for “information technology” and that’s no accident. In fact, it’s a reflection of the primary mission of every I.T. organization – to provide the means and methods for creating, storing, transmitting, printing and retrieving business related information. By design, this operational mission is driven by the need to “protect”, which also includes preventing unauthorized access, uncontrolled modification and unwarranted destruction. The priorities are self evident – data integrity is vital, and vital needs must be met with purpose and committment. The tricky part is to balance vital interests with the associated costs and operational overhead. This is the higher purpose of data security and the goal of related policy development. Data Security Practices and Policy Purpose As discussed, “data security” provides the means by which business data and related information is protected and preserved. This is realized in multiple ways, as listed below: Data security technology and practices provide the means by which data can be safely created, stored, transmitted, printed and retrieved. Data security technology and practices provide the means by which data accuracy and integrity is ensured and maintained. Data security technology and practices provide the means to prevent and control unauthorized access, modification and destruction. Data security technology and practices provide the opportunity to minimize the risks and costs associated with data loss, data corruption and unauthorized access. Of course, the physical means of “securing data” are essential to the process. You must have the technical ability (through hardware and software) to physically meet each of the above listed objectives. But that will only take you part of the way. To realize all of the intended benefits, data security practices must be “institutionalized” – i.e. integrated into the corporate culture and made part of how a given organization works. This is achieved through the
  • 2. 2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org http://it-toolkits.org/blog/?p=74 2/4 development and implementation of effective “data security policy”. Policy is a governance mechanism, used to translate tangible security objectives into organizational terms that can be implemented and enforced. In the case of data security, related policies provide the “how, what, and why” to communicate security objectives and promote expected compliance. To fulfill this mission, data security policy must be developed and documented to reflect the following components and answer the underlying formative questions: Policy Purpose What are the specific goals of this data security policy? Why has the policy been created (considering the background events leading to policy development)? What will the policy accomplish considering data security goals and objectives? Policy Basis What is the underlying authority and/or organizational basis for this data security policy (considering internal guidelines and/or external regulatory requirements)? Do you have sufficient executive support to sufficiently enforce compliance with all of the policy provisions? Policy Scope What are the organizational targets of the policy considering company-wide applicability, division specific application, departmental application or location specific application? What are the data targets of the policy considering the types of files, records, information and applications covered by the policy? Policy Stakeholders Who are the policy stakeholders considering both individuals and groups who have a vested interest in the policy and ability to influence the outcome? What are the specific roles and responsibilities required to implement, administer and enforce all policy terms, including all stated compliance obligations? Security Means and Methods What are the means and methods to be utilized to realize all identified data security requirements, including data encryption, data access restrictions, security monitoring, data classifications, userid requirements, password requirements, data storage mechanisms, and related matters? Compliance and Enforcement Guidelines What are established guidelines for data security compliance? Will there be any exceptions and/or waivers with regard to policy compliance? If so, what are the terms under which exceptions and/or waivers will be granted? How will compliance be enforced and what are the consequences for a failure to comply? How will employees be provided with training relating to data security compliance?
  • 3. 2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org http://it-toolkits.org/blog/?p=74 3/4 What types of auditing procedures will be used to monitor and promote data security compliance? Take an Inclusive Approach to Policy Development Every data security policy will benefit from an inclusive approach to development and implementation. It takes a partnership between all of the interested and invested stakeholders to fully realize policy relevance and enforcement. In the collaborative approach, the end-user partner defines the need (the data to be protected and the business basis behind the security requirements). The IT partner provides the technical means (and capability) by which the identified data security needs can be met. These needs and means are then combined to form actionable policy through an “inclusive” development process, characterized by input and collaboration at every stage: Policy planning relies on input and information relating to data security needs and policy objectives. Policy preparation relies on the review of policy drafts, negotiation, and feedback relating to specific terms and related obligations, Policy implementation relies on the documented acceptance (and approval) of policy terms and compliance obligations on the part of decision making stakeholders. As policy development unfolds, checkpoints should be established to ensure that all decision making stakeholders have been sufficiently engaged in the development process. Considering the long term benefits of collaborative policy development (compliance is more readily secured when you have advance buy-in), it’s always a good idea to create a “policy team” or committee as the organizational vehicle for policy development. This policy team or committee should include members from all sides – the end-user community, IT department, Legal department, Human Resources and any other appropriate department with something to contribute. This will help to ensure that the policy delivered represents all interests, incorporates all concerns, and has the greatest chance to succeed. You may also like
  • 4. 2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org http://it-toolkits.org/blog/?p=74 4/4