O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Monitoring, Controls, and Remedies

The most controversial section of any information security policy outlines the type of monitoring, controls, and remedies for violations. The controversy arises from some of the monitoring and control policies that can be used in enforcing information security. Although legal, privacy advocates see some of these methods as a violation of an individual’s privacy rights. In my work with many organizations, I suggest that they be careful and create a policy that implements rather than one that suggests mistrust.

A problem with this is that statistics show that most security violations come from within the organization, even though the mainstream press focuses on external events. Because of the publicity, many ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required