Skip to Main Content
Information Security Policy Development for Compliance
book

Information Security Policy Development for Compliance

by Barry L. Williams
April 2016
Intermediate to advanced content levelIntermediate to advanced
152 pages
4h 9m
English
Auerbach Publications
Content preview from Information Security Policy Development for Compliance
102
InformatIon SecurIty PolIcy DeveloPment for comPlIance
c. Deploys monitoring devices: (i) strategically within the informa-
tion system to collect organization-determined essential infor-
mation; and (ii) at ad hoc locations within the system to track
specic types of transactions of interest to the organization;
d. Heightens the level of information system monitoring activity
whenever there is an indication of increased risk to organiza-
tional operations and assets, individuals, other organizations, or
the Nation based on law enforcement information, intelligence
information, or other credible sources of information; and
e. Obt
ains legal opinion with regard to information system
monitoring activities in accordance with applicable ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Writing Information Security Policies

Writing Information Security Policies

Scott Barman

Publisher Resources

ISBN: 9781466580589