Information Security Policy

Download Information Security Policy template

Information Security Policy, version 1.0.0

Introduction

Information security is a holistic discipline, meaning that its application, or lack thereof, affects all facets of an organization or enterprise. The goal of the (District/Organization) Information Security Program is to protect the Confidentiality, Integrity, and Availability of the data employed within the organization while providing value to the way we conduct business. Protection of the Confidentiality, Integrity, and Availability are basic principles of information security, and can be defined as:

  • Confidentiality – Ensuring that information is accessible only to those entities that are authorized to have access, many times enforced by the classic “need-to-know” principle.
  • Integrity – Protecting the accuracy and completeness of information and the methods that are used to process and manage it.
  • Availability – Ensuring that information assets (information, systems, facilities, networks, and computers) are accessible and usable when needed by an authorized entity.

(District/Organization) has recognized that our business information is a critical asset and as such our ability to manage, control, and protect this asset will have a direct and significant impact on our future success. 

This document establishes the framework from which other information security policies may be developed to ensure that the enterprise can efficiently and effectively manage, control and protect its business information assets and those information assets entrusted to (District/Organization) by its stakeholders, partners, customers and other third-parties.

The (District/Organization) Information Security Program is built around the information contained within this policy and its supporting policies.

Purpose

The purpose of the (District/Organization) Information Security Policy is to describe the actions and behaviors required to ensure that due care is taken to avoid inappropriate risks to (District/Organization), its business partners, and its stakeholders.

Audience

The (District/Organization) Information Security Policy applies equally to any individual, entity, or process that interacts with any (District/Organization) Information Resource.

Responsibilities

Executive Management 

  • Ensure that an appropriate risk-based Information Security Program is implemented to protect the confidentiality, integrity, and availability of all Information Resources collected or maintained by or on behalf of (District/Organization).
  • Ensure that information security processes are integrated with strategic and operational planning processes to secure the organization’s mission.
  • Ensure adequate information security financial and personnel resources are included in the budgeting and/or financial planning process.
  • Ensure that the Security Team is given the necessary authority to secure the Information Resources under their control within the scope of the (District/Organization) Information Security Program.
  • Designate an Information Security Officer and delegate authority to that individual to ensure compliance with applicable information security requirements.
  • Ensure that the Information Security Officer, in coordination with the Security Team, reports annually to Executive Management on the effectiveness of the (District/Organization) Information Security Program.

Information Security Officer

  • Chair the Security Team and provide updates on the status of the Information Security Program to Executive Management.
  • Manage compliance with all relevant statutory, regulatory, and contractual requirements.
  • Participate in security related forums, associations and special interest groups.
  • Assess risks to the confidentiality, integrity, and availability of all Information Resources collected or maintained by or on behalf of (District/Organization).
  • Facilitate development and adoption of supporting policies, procedures, standards, and guidelines for providing adequate information security and continuity of operations.
  • Ensure that (District/Organization) has trained all personnel to support compliance with information security policies, processes, standards, and guidelines. Train and oversee personnel with significant responsibilities for information security with respect to such responsibilities.
  • Ensure that appropriate information security awareness training is provided to District personnel, including contractors.
  • Implement and maintain a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies, procedures, and practices of (District/Organization).
  • Develop and implement procedures for testing and evaluating the effectiveness of the (District/Organization) Information Security Program in accordance with stated objectives.
  • Develop and implement a process for evaluating risks related to vendors and managing vendor relationships.
  • Report annually, in coordination with the Security Team, to Executive Management on the effectiveness of the (District/Organization) Information Security Program, including progress of remedial actions.

Information Security Team

  • Ensure compliance with applicable information security requirements.
  • Formulate, review and recommend information security policies.
  • Approve supporting procedures, standards, and guidelines related to information security.
  • Provide clear direction and visible management support for information security initiatives.
  • Assess the adequacy and effectiveness of the information security policies and coordinate the implementation of information security controls.
  • Ensure that ongoing security activities are executed in compliance with policy.
  • Review and manage the information security policy waiver request process.
  • Review information security incident information and recommend follow-up actions.
  • Promote information security education, training, and awareness throughout (District/Organization), and initiate plans and programs to maintain information security awareness.
  • Report annually, in coordination with the Security Officer, to Executive Management on the effectiveness of the (District/Organization) Information Security Program, including progress of remedial actions.

All Employees, Contractors, and Other Third-Party Personnel

  • Understand their responsibilities for complying with the (District/Organization) Information Security Program.
  • Use (District/Organization) Information Resources in compliance with all (District/Organization) Information Security Policies.
  • Seek guidance from the Information Security Team for questions or issues related to information security.

Policy

  • (District/Organization) maintains and communicates an Information Security Program consisting of topic-specific policies, standards, procedures and guidelines that:
    • Serve to protect the Confidentiality, Integrity, and Availability of the Information Resources maintained within the organization using administrative, physical and technical controls.
    • Provide value to the way we conduct business and support institutional objectives.
    • Comply with all regulatory and legal requirements, including: (adjust as appropriate)
      • HIPAA Security Rule,
      • State breach notification laws,
      • PCI Data Security Standard,
      • Information Security best practices, including ISO 27002 and NIST CSF,
      • Contractual agreements,
      • All other applicable federal and state laws or regulations.
  • The information security program is reviewed no less than annually or upon significant changes to the information security environment.

Definitions

See Appendix A: Definitions

References

  • ISO 27002: 5, 6, 7, 18
  • NIST CSF: ID.AM, ID.BE, ID.GV, PR.AT, PR.IP

Waivers

Waivers from certain policy provisions may be sought following the (District/Organization) Waiver Process.

Enforcement

Personnel found to have violated this policy may be subject to disciplinary action, up to and including termination of employment, and related civil or criminal penalties. 

Any vendor, consultant, or contractor found to have violated this policy may be subject to sanctions up to and including removal of access rights, termination of contract(s), and related civil or criminal penalties.

Version History

VersionModified DateApproved DateApproved ByReason/Comments
1.0.0February 2018 SecurityStudioDocument Origination
     
     
     
s2core

Estimate your score or book free demo today