Security Policy: Difference between revisions

Jump to navigation Jump to search
Line 202: Line 202:
The organization’s information security management system shall include:
The organization’s information security management system shall include:


#documented information required by this International Standard; and
:1. Documented information required by this International Standard; and


#documented information determined by the organization as being necessary for the effectiveness of the information security management system.
:2. Documented information determined by the organization as being necessary for the effectiveness of the information security management system.


   <small>NOTE The extent of documented information for an information security management system can differ from one organization to another due to: </small>
   <small>NOTE The extent of documented information for an information security management system can differ from one organization to another due to: </small>


*the size of organization and its type of activities, processes, products and services;
:3. The size of organization and its type of activities, processes, products and services;


*the complexity of processes and their interactions; and
:4. The complexity of processes and their interactions; and


*the competence of persons.
:5. The competence of persons.


====Creating and updating====
====Creating and updating====
Line 219: Line 219:


#identification and description (e.g. a title, date, author, or reference number);
#identification and description (e.g. a title, date, author, or reference number);
#format (e.g. language, software version, graphics) and media (e.g. paper, electronic); and
#format (e.g. language, software version, graphics) and media (e.g. paper, electronic); and
#review and approval for suitability and adequacy.
#review and approval for suitability and adequacy.


Line 228: Line 226:
Documented information required by the information security management system and by this International Standard shall be controlled to ensure:
Documented information required by the information security management system and by this International Standard shall be controlled to ensure:


#it is available and suitable for use, where and when it is needed; and
:1. it is available and suitable for use, where and when it is needed; and


#it is adequately protected (e.g. from loss of confidentiality, improper use, or loss of integrity).
:2. it is adequately protected (e.g. from loss of confidentiality, improper use, or loss of integrity).


For the control of documented information, the organization shall address the following activities, as applicable:
For the control of documented information, the organization shall address the following activities, as applicable:


#distribution, access, retrieval and use;
:3. distribution, access, retrieval and use;


#storage and preservation, including the preservation of legibility;
:4. storage and preservation, including the preservation of legibility;


#control of changes (e.g. version control); and
:5. control of changes (e.g. version control); and


#retention and disposition.
:6. retention and disposition.


Documented information of external origin, determined by the organization to be necessary for the planning and operation of the information security management system, shall be identified as
Documented information of external origin, determined by the organization to be necessary for the planning and operation of the information security management system, shall be identified as appropriate, and controlled.
appropriate, and controlled.


   <small>NOTE Access implies a decision regarding the permission to view the documented information only, or the permission and authority to view and change the documented information, etc </small>
   <small>NOTE Access implies a decision regarding the permission to view the documented information only, or the permission and authority to view and change the documented information, etc </small>