Security Policy: Difference between revisions
Jump to navigation
Jump to search
m →Policy |
m →Policy |
||
| Line 52: | Line 52: | ||
:1. Is appropriate to the purpose of the organization; | :1. Is appropriate to the purpose of the organization; | ||
:2. Includes information security objectives (see [[Security_Policy#information_security_objectives_and_planning_to_achieve_them|here]]) or provides the framework for setting information security objectives; | |||
:3. Includes a commitment to satisfy applicable requirements related to information security; and | |||
:4. Includes a commitment to continual improvement of the information security management system. | |||
The information security policy shall: | The information security policy shall: | ||
:5. Be available as documented information; | |||
:6. Be communicated within the organization; and | |||
:7. Be available to interested parties, as appropriate. | |||
Link to [https://docs.google.com/document/d/1_DLI40iDWLdDX672WwRZGfnIe88Ye0si9RMEwpgl3R4/edit?usp=sharing IS Policy and Objectives] | Link to [https://docs.google.com/document/d/1_DLI40iDWLdDX672WwRZGfnIe88Ye0si9RMEwpgl3R4/edit?usp=sharing IS Policy and Objectives] | ||