Security Policy: Difference between revisions
Jump to navigation
Jump to search
| Line 54: | Line 54: | ||
#Includes information security objectives (see [[Security_Policy#information_security_objectives_and_planning_to_achieve_them|here]]) or provides the framework for setting information security objectives; | #Includes information security objectives (see [[Security_Policy#information_security_objectives_and_planning_to_achieve_them|here]]) or provides the framework for setting information security objectives; | ||
#Includes a commitment to satisfy applicable requirements related to information security; and | #Includes a commitment to satisfy applicable requirements related to information security; and | ||
#Includes a commitment to continual improvement of the information security management system. | #Includes a commitment to continual improvement of the information security management system. The information security policy shall: | ||
#Be available as documented information; | |||
# Be available as documented information; | #Be communicated within the organization; and | ||
# Be communicated within the organization; and | #Be available to interested parties, as appropriate. | ||
# Be available to interested parties, as appropriate. | |||
Link to [https://docs.google.com/document/d/1_DLI40iDWLdDX672WwRZGfnIe88Ye0si9RMEwpgl3R4/edit?usp=sharing IS Policy and Objectives] | Link to [https://docs.google.com/document/d/1_DLI40iDWLdDX672WwRZGfnIe88Ye0si9RMEwpgl3R4/edit?usp=sharing IS Policy and Objectives] | ||