Security Policy: Difference between revisions
		
		
		
		Jump to navigation
		Jump to search
		
| Line 202: | Line 202: | ||
| The organization’s information security management system shall include: | The organization’s information security management system shall include: | ||
| :1. Documented information required by this International Standard; and | |||
| :2. Documented information determined by the organization as being necessary for the effectiveness of the information security management system. | |||
|     <small>NOTE The extent of documented information for an information security management system can differ from one organization to another due to: </small> |     <small>NOTE The extent of documented information for an information security management system can differ from one organization to another due to: </small> | ||
| :3. The size of organization and its type of activities, processes, products and services; | |||
| :4. The complexity of processes and their interactions; and | |||
| :5. The competence of persons. | |||
| ====Creating and updating==== | ====Creating and updating==== | ||
| Line 219: | Line 219: | ||
| #identification and description (e.g. a title, date, author, or reference number); | #identification and description (e.g. a title, date, author, or reference number); | ||
| #format (e.g. language, software version, graphics) and media (e.g. paper, electronic); and | #format (e.g. language, software version, graphics) and media (e.g. paper, electronic); and | ||
| #review and approval for suitability and adequacy. | #review and approval for suitability and adequacy. | ||
| Line 228: | Line 226: | ||
| Documented information required by the information security management system and by this International Standard shall be controlled to ensure: | Documented information required by the information security management system and by this International Standard shall be controlled to ensure: | ||
| :1. it is available and suitable for use, where and when it is needed; and | |||
| :2. it is adequately protected (e.g. from loss of confidentiality, improper use, or loss of integrity). | |||
|  |  | ||
| For the control of documented information, the organization shall address the following activities, as applicable: | For the control of documented information, the organization shall address the following activities, as applicable: | ||
| :3. distribution, access, retrieval and use; | |||
| :4. storage and preservation, including the preservation of legibility; | |||
| :5. control of changes (e.g. version control); and | |||
| :6. retention and disposition. | |||
| Documented information of external origin, determined by the organization to be necessary for the planning and operation of the information security management system, shall be identified as | Documented information of external origin, determined by the organization to be necessary for the planning and operation of the information security management system, shall be identified as appropriate, and controlled. | ||
| appropriate, and controlled. | |||
|     <small>NOTE Access implies a decision regarding the permission to view the documented information only, or the permission and authority to view and change the documented information, etc </small> |     <small>NOTE Access implies a decision regarding the permission to view the documented information only, or the permission and authority to view and change the documented information, etc </small> | ||