2 cissp ® Official Study Guide Eighth Edition


Compliance Policy Requirements



Download 19,3 Mb.
Pdf ko'rish
bet74/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   70   71   72   73   74   75   76   77   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Compliance Policy Requirements
Compliance
is the act of conforming to or adhering to rules, policies, regulations, 
standards, or requirements. Compliance is an important concern to 
security governance

On a personnel level, compliance is related to whether individual employees follow 
company policy and perform their job tasks in accordance to defined procedures. Many 


Personnel Security Policies and Procedures 
61
organizations rely on employee compliance in order to maintain high levels of quality, 
consistency, effi ciency, and cost savings. If employees do not maintain compliance, it 
could cost the organization in terms of profi t, market share, recognition, and reputation. 
Employees need to be trained in regard to what they need to do (i.e., stay in line with 
company standards as defi ned in the security policy and remain in compliance with any 
contractual obligations such as Payment Card Industry Data Security Standard (PCI DSS) 
to maintain the ability to perform credit card processing); only then can they be held 
accountable for violations or lacking compliance.
Privacy Policy Requirements 
Privacy
can be a diffi cult concept to defi ne. The term is used frequently in numerous contexts 
without much quantifi cation or qualifi cation. Here are some partial defi nitions of privacy: 

Active prevention of unauthorized access to information that is personally identifiable 
(that is, data points that can be linked directly to a person or organization) 

Freedom from unauthorized access to information deemed personal or confidential 

Freedom from being observed, monitored, or examined without consent or knowledge
A concept that comes up frequently in discussions of privacy is personally 
identifiable information (PII). PII is any data item that can be easily and/
or obviously traced back to the person of origin or concern. A phone 
number, email address, mailing address, social security number, and 
name are all PII. A MAC address, Internet Protocol (IP) address, OS type, 
favorite vacation spot, name of high school mascot, and so forth are 
not typically considered to be PII. However, that is not a universally true 
statement. In Germany and other member countries of the European 
Union (EU), IP addresses and MAC addresses are considered PII in some 
situations (see
https://www.whitecase.com/publications/alert/
court-confirms-ip-addresses-are-personal-data-some-cases
 ).
When addressing privacy in the realm of IT, there is usually a balancing act between 
individual rights and the rights or activities of an organization. Some claim that individuals 
have the right to control whether information can be collected about them and what can be 
done with it. Others claim that any activity performed in public view—such as most activi-
ties performed over the LC internet or activities performed on company equipment—can 
be monitored without knowledge of or permission from the individuals being watched and 
that the information gathered from such monitoring can be used for whatever purposes an 
organization deems appropriate or desirable. 
Protecting individuals from unwanted observation, direct marketing, and disclosure of 
private, personal, or confi dential details is usually considered a worthy effort. However, some 
organizations profess that demographic studies, information gleaning, and focused market-
ing improve business models, reduce advertising waste, and save money for all parties. 


62
Chapter 2 

Personnel Security and Risk Management Concepts
There are many legislative and regulatory compliance issues in regard to privacy. Many 
US regulations—such as the Health Insurance Portability and Accountability Act (HIPAA), 
the Sarbanes-Oxley Act of 2002 (SOX), the Family Educational Rights and Privacy Act 
(FERPA), and the Gramm-Leach-Bliley Act—as well as the EU’s Directive 95/46/EC (aka
the Data Protection Directive), the General Data Protection Regulation (GDPR) (Regulation 
(EU) 2016/679), and the contractual requirement Payment Card Industry Data Security 
Standard (PCI DSS)—include privacy requirements. It is important to understand all gov-
ernment regulations that your organization is required to adhere to and ensure compliance, 
especially in the areas of privacy protection.
Whatever your personal or organizational stance is on the issue of online privacy, it 
must be addressed in an organizational security policy. Privacy is an issue not just for exter-
nal visitors to your online offerings but also for your customers, employees, suppliers, and 
contractors. If you gather any type of information about any person or company, you must 
address privacy.
In most cases, especially when privacy is being violated or restricted, the individuals and 
companies must be informed; otherwise, you may face legal ramifications. Privacy issues 
must also be addressed when allowing or restricting personal use of email, retaining email, 
recording phone conversations, gathering information about surfing or spending habits, 
and so on.
Security Governance

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   70   71   72   73   74   75   76   77   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish