There are a ton of great sample security policies available at the SAN Institute Security Policy Project here. Included in the policies you can download in either Word or PDF format are: Acceptable Encryption Policy Defines requirements for encryption algorithms used within the organization. Acceptable Use Policy Defines acceptable use of equipment and computing services, […]
Read the full article →
Cynthia Bonnette, the Director of Information Security Risk Assessment for NETBankAudit in Arlington, VA wrote a sample incident response policy which appeared in this issue of the AML Compliance Alert here. Here’s an exerpt: INCIDENT IDENTIFICATION, CLASSIFICATION AND ESCALATION Once detected, suspected incidents (e.g., anomalous activity) must be reported. The nature and severity of the […]
Read the full article →