The Security Logging Policy was developed by the Company in order to allow the secure and effective use of the Information Technology Asset like computer, systems or data.
In general, a security’s log is a collection of records containing data about security relevant events, i.e., attempted violations of the security policy and changes to the security state of the system.
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. REQUIREMENTS
4. RESPONSIBILITIES
4.1 EMPLOYEES
4.2 SYSTEM ADMINISTRATORS
4.3 DEPARTMENT MANAGER(S)
5. EXCEPTIONS
6. FINAL CONSIDERATIONS
6.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
6.2 DOCUMENT REVISION
Pages: 8
This bundle contains all the products listed in the Operations Management section. Take advantage of the 25% OFF when buying the bundle!
The Confidential Information – Breaches and Escalation Policy sets out the escalation procedures to follow in the event of a breach of confidential information within Company and requirements regarding the protection of confidential information with third party service providers.
The objective of this procedure is to ensure the security of Company’s assets. Effective security controls in relation to access the data are an essential component of the effective risk management of Company's data resource.
Review Security Logging Policy.
You must be logged in to post a review.