Skip to Main Content
Information Security Policy Development for Compliance
book

Information Security Policy Development for Compliance

by Barry L. Williams
April 2016
Intermediate to advanced content levelIntermediate to advanced
152 pages
4h 9m
English
Auerbach Publications
Content preview from Information Security Policy Development for Compliance
6
InformatIon SecurIty PolIcy DeveloPment for comPlIance
Acceptable Use (continued)
Describe appropriate and nonappropriate
use of resources to include the following:
• Appropriate use of e-mail and related
resources
• No expectation of privacy
• Monitoring and logging with or without
the user’s consent
NOTE: The above may be included as part of
the overall information security policy.
List other acceptable and nonacceptable
uses for your organization.
ISO/IEC 27001 A.7.1.3 L095
NIST SP 800-53 PL-4 L096
HIPAA Standard
PCI DSS V2.0
AUP V5.0
Data Classification and Document Retention
Describe the method of information
classification.
ISO/IEC 27001 A.7.2.1 L097 ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Writing Information Security Policies

Writing Information Security Policies

Scott Barman

Publisher Resources

ISBN: 9781466580589