Legal and Privacy Issues in Information Security PDF
Document Details
![EnergeticTriumph](https://quizgecko.com/images/avatars/avatar-6.webp)
Uploaded by EnergeticTriumph
2020
J. L. Grama
Tags
Summary
This document explores information security governance, emphasizing its role in protecting an organization's data assets and aligning security goals with business needs. Topics include information security policies, the C-I-A triad, and strategic planning. Written by J. L. Grama in 2020, it provides guidance on managing information security.
Full Transcript
© mirjanajovic/DigitalVision Vectors/Getty Images CHAPTER...
© mirjanajovic/DigitalVision Vectors/Getty Images CHAPTER 13 Information Security Governance HIS CHAPTER DISCUSSES information security governance. It also discusses T information security policies. An organization’s governance structure is an important part of its information security program. Governance focuses on the structure used to protect resources and data. This structure must support business needs and provide security. Strong governance helps create strong security programs. Organizations use policies, standards, guidelines, and procedures to create their security program. These documents help guide employee conduct and state the organization’s rules for how information technology resources are secured. They Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. also help protect an organization from legal liability. Chapter 13 Topics This chapter covers the following topics and concepts: What information security governance is What information security governance documents are What recommended information security policies are What some case studies and examples are Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. Chapter 13 Goals When you complete this chapter, you will be able to: Describe the key concepts and terms associated with information security governance Describe the goals of different information security governance documents Describe the different types of policies that can be used to govern information security Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. What Is Information Security Governance? For almost any organization, data is a valuable asset. Yet, over 50 percent of large corporations report that they do not treat data as a business asset.1 An organization must find ways to use its data to meet its business goals, such as providing services to consumers and making a profit. It also must protect its data. This balance is key to an organization’s success. Failing to strike the right balance can harm the organization’s goals. Consider the following: An organization cannot market its products without access to customer lists. Customers may complain about incorrect electronic data. If confidential data is disclosed, an organization faces embarrassment. An organization’s executive management team is responsible for governing the organization. This means it is also responsible for information security governance (ISG), the executive management team’s responsibility to protect an organization’s information assets. ISG makes protecting information assets a business decision. To do this, an organization must align its information security goals to its business needs. ISG moves information security beyond technical decisions and makes security a strategic decision. NOTE The security goals of confidentiality, integrity, and availability are called the C-I-A triad or the A-I-C triad. Organizations use ISG to enhance their business. ISG makes sure that information security concepts are applied in a way that helps meet business goals. ISG also makes sure that there is proper accountability and oversight for meeting these goals. The C-I-A triad appears in FIGURE 13-1. Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. FIGURE 13-1 Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. The C-I-A triad. Description Information Security Governance Planning ISG refers to executive management’s responsibility to provide strategic direction, oversight, and accountability for the security of its data and information technology (IT) resources. Their main duty is to make sure that the information security strategy supports its business goals. A common business goal is to make a profit. The organization must consider many factors that affect this goal. Business drivers are the forces that influence the Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. organization’s business goals. They can be internal or external and include people, processes, and trends. Common business drivers may include the availability of raw materials and employees, the location of factories, and the costs of transporting products to market. An organization must balance business drivers to meet its goals. They do this during the business planning process. There are three types of business planning. They are: Strategic planning—This is long-term planning. Strategic planning focuses on preparing new approaches and planning for new products, technologies, or processes. It lays the groundwork for new business directions. Tactical planning—This is short- to medium-term planning. Tactical planning allows organizations to be responsive to market conditions. It allows them to take advantage of short-term or unexpected opportunities. Tactical plans are usually 6 months or less in length. Operational planning—This is day-to-day planning. Operational planning focuses on the normal operations of an organization. It is responsive to daily issues. FIGURE 13-2 illustrates the different types of business planning. Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. FIGURE 13-2 Business planning hierarchy. Description Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. The organization’s executive management team carries out strategic planning. This is when it determines the business’s goals. Once it determines its business goals, it must figure out how information security can help support these goals. It will use the same types of planning strategies to think about information security. This is ISG planning. When planning for information security, the organization must think about: Information needs—The organization must ask how it uses data to meet its business goals. It must then think about how information security can support this. For instance, if an organization conducts most of its business on the internet, it may need to focus its attention on techniques to ensure availability and integrity. Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. Its IT systems must hold accurate data and be ready to conduct business. Regulatory requirements—The organization must know its regulatory landscape. It must know the data protection laws that it must follow. Often these laws focus on protecting the confidentiality of certain types of data. Risk management—The organization must adopt a risk management approach. It must know the information security risks that it faces. It also must prioritize that risk and decide how it will respond to it. Security failures—The organization must think about information security failures and how those failures might harm the business. For instance, it must consider the impact of a security breach, malware-infected IT resources, or unavailable data. There are many negative impacts of an information security failure. These include lawsuits and breach notification costs. An organization will certainly lose customers after an information security incident. This affects its bottom line. NOTE A 2019 survey found the average organizational cost of a data breach in the United States is almost $4 million.2 An organization answers these questions to determine ISG strategic direction. It makes sure that its information security goals support its business objectives. This is the role of ISG. Common Information Security Governance Roles It is important to know who makes information security decisions, whether they are strategic, tactical, or operational. Not every organization has the same structure. Organizations can have different legal forms, such as corporations, partnerships, or limited liability companies. These legal forms are governed by state law. This section reviews ISG roles. You will be more likely to find the roles described here in larger organizations, such as corporations. Smaller organizations may not fill all of these Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. roles; rather, they may combine many duties within one role. Nonprofit and educational organizations may also have different roles for people. These organizations tend to have structures with many shared responsibilities. Many different roles can make decisions about information security. The typical ISG roles are: Board of directors Chief information officer Chief information security officer Information security managers Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. The board of directors (BOD), an organization’s top governance group, runs the organization. A BOD is required by law to act with due care. It must make all of its decisions in the best interests of the organization. The BOD plans an organization’s strategic direction and determines its business goals. It makes sure that an organization uses its resources effectively to meet these goals. Finally, it makes sure that an organization acts legally. If an organization does not have a BOD, then its top-ranking executive group performs these duties. The BOD determines how information security will reduce risk and support business goals through strategic planning. The BOD issues high-level information security policies and delegates tactical and operational activities to other senior managers. The main duty of a BOD is governance for the organization and for information security. The chief information officer (CIO) is the organization’s senior IT official. The CIO focuses on strategic IT issues and defines the organization’s IT mission. It is the CIO’s job to keep the BOD advised about IT issues. CIOs are not usually involved in day-to-day IT operations. Their duties are strategic and tactical in nature. They often delegate responsibility for information security management (ISM) to a CISO. A CIO is not the same as a chief technology officer (CTO). A CIO is responsible for a company’s internal IT systems and focuses on the systems used to run the organization’s business. A CIO tends to be internally focused. In contrast, a CTO develops a company’s technology products. These are the products that the company delivers to its customers. A CTO tends to be externally focused. The chief information security officer (CISO) is the organization’s senior information security official. The role of the CISO is relatively new and continues to evolve. Depending on an organization’s structure, the CISO might report to the CIO. A CISO also could report to the organization’s chief financial officer (CFO). CISOs are responsible for an organization’s information security strategy. They also are very involved in tactical planning. However, they are not generally involved in daily IT operations. The CISO makes sure that the CIO and BOD understand information security threats and how to respond to those threats. The CISO may make information Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. security policy suggestions to the BOD. A CISO also helps determine information security safeguards, and usually delegates functional and operational tasks to other managers. NOTE In March 2009, U.S. President Barack Obama appointed the first federal CIO, who was responsible for government IT spending. Information security managers are responsible for the functional management of an organization’s information security program. They manage the operational Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. activities and implement the controls specified by the CISO. These managers might also: Create information security standards, guidelines, and procedures Participate in risk assessments Manage the security infrastructure These roles work together. The higher-level roles make governance decisions, whereas the lower-level roles are responsible for carrying out ISM and operational activities. Information Security Governance and Management ISG and ISM are not the same thing. Although the terms are often used interchangeably, the distinction is subtle. You should keep in mind that sometimes the difference is not clear. Many organizations use one or both terms to refer to all ISG and ISM activities. Many activities have both ISG and ISM elements. ISG, which is handled by the BOD, CIO, and CISO, makes sure that security is used to support business goals. It offers a process for oversight and accountability and makes sure that there is a structure in place to direct information security activities. Creating an Information Security Governance Program There are many resources available to help organizations create an ISG program. The International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) have created a comprehensive standard to help guide this process.3 The standard uses the term ISM system to refer to both ISG and ISM activities. The standard helps organizations create an ISM system by using a risk-based approach. It reviews how to operate, monitor, review, maintain, and improve the ISM system. It walks through each step and outlines the processes that an organization must consider at each step. Any organization can use this standard, as it is designed to be flexible to meet an organization’s needs. It can Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. be especially helpful to organizations that have never managed information security on a strategic level. It is also designed to work with the ISO/IEC security controls standard called “ISO/IEC 27002:2013, Information Technology—Security Techniques—Code of Practice for Information Security Controls.” Organizations must review their ISM systems regularly. They need to know if their ISM controls are improving security. To do this, they must measure their effectiveness. The ISO/IEC has guidance on this as well. That document is titled “ISO/IEC 27004:2016 Information Technology—Security Techniques—Information Security Management—Monitoring, Measurement, Analysis, and Evaluation.” This standard helps organizations review their ISM system. It helps organizations create control measurements and analyze the measurements. The process helps organizations decide if their policies or controls need to be changed. ISM, the organization’s day-to-day security operations, is the visible part of ISG Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. activities. It makes sure that ISG policies are put into practice. ISM maintains the organization’s overall security posture. ISG states what that posture must be. TABLE 13-1 compares ISG and ISM. TABLE 13-1 Comparison of Information Security Governance and Information Security Management INFORMATION SECURITY GOVERNANCE INFORMATION SECURITY MANAGEMENT Strategic and tactical Tactical and operational Creates policies and strategy Implements policies and strategy Ultimate compliance authority and oversight Day-to-day management and authority BOD, CIO, CISO CISO and information security managers Information Security Governance in the Federal Government Congress created the Federal Information Security Modernization Act (FISMA) to protect federal data and IT resources.4 Federal agencies fall under the executive branch of the U.S. government and report to the president of the United States. U.S. federal agencies must comply with FISMA. FISMA requires each federal agency to develop an information security program and name a CISO to lead the program. The program must assess the agency’s information security risk, include plans to reduce that risk, and provide security awareness and training activities to employees. Agencies must report on their FISMA compliance progress each year. They send these reports to the Government Accountability Office (GAO). NOTE You can view the GAO high-risk website at https://www.gao.gov/highrisk/overview. Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. Information security is a high priority for the federal government. Since 1997, the GAO has included protecting the nation’s information systems and cyber critical infrastructure on its “high risk list.” Issues are high-risk if they are vulnerable to fraud, waste, abuse, or mismanagement. The GAO publishes the list every 2 years.5 Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. Information Security Governance Documents An organization’s ISG documents form the basis of its information security program. They document the organization’s commitment to information security. They are used to address: The organization’s information security goals How the organization protects its own data How the organization protects the data of others Compliance with legal and regulatory requirements Employee information security responsibilities Consequences for failing to meet responsibilities Organizations use policies, standards, guidelines, and procedures to create their security program. These documents work together to support information security goals. A formal policy is the highest-level governance document. Standards are the next level. Then procedures. Guidelines provide security advice. The documents move from the general (policies) to the more specific (procedure). FIGURE 13-3 shows how these documents work together. Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. FIGURE 13-3 Information security governance documents. Description Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. For purposes of this discussion, these documents are collectively referred to as “ISG documents” or “policies.” You should keep in mind that the term policies is often used in a very generic way. It is used to describe the entire suite of ISG documents. It will be clear from the text when the term is used in the generic way. NOTE ISG documents are administrative safeguards. Policies Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. A formal policy is executive management’s high-level statement of information security direction and goals. They are the top level of governance documents and help minimize risk by laying out the organization’s information security strategy. High-level policies are approved by an organization’s BOD. The BOD uses policies to set forth its information security goals. They also state compliance expectations. Not all organizations will have the same types of high-level policies. They are unique to each organization. Each organization develops policies by reviewing its regulatory landscape, taking into account the size and complexity of the organization and its IT systems. They also think about how information security can be used to help meet business goals. Policies must be drafted with care. Policy elements vary among organizations. However, there are some common elements to all policies. They include: Policy statement—States the expected behavior, actions, or outcomes. It is a clear statement of permitted or forbidden actions. Policy exclusions—Lists situations or people who are not covered by the policy. For the most part, there should not be many exclusions in a high-level policy. Policy rationale—States the reason why the policy exists. This includes the legal or regulatory reasons for the policy. A policy might be drafted in response to information security threats. Policy definitions—Defines terms that have special meaning. Terms with common definitions do not need to be defined. Who is affected by the policy—States the people, units, or departments affected by the policy. In a high-level policy, this usually is all of the organization’s employees. Who must follow the policy—Lists who must follow the policy as part of their job responsibilities, or if some people have special policy responsibilities because of their job duties. Compliance language—States how the organization will enforce the policy. It also states what happens to units and employees who fail to follow the policy. Related documents—Lists other documents that are related to the policy. Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. Standards or procedures that support the policy should be listed in this section. Policy contact—Lists the person who is responsible for answering questions about the policy. Policy history—Lists historical data about the policy. This section should list revision and review dates. High-level policies are concise and tightly worded so that they are easy to understand. A high-level information security policy states the organization’s information security expectations. They should be written in a way so that all employees can understand them. These high-level documents do not usually include explanations about how to meet those expectations. Supporting documents, such as Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. standards, guidelines, and procedures, provide that detail. FYI The SANS Institute has a policy web page that gives drafting advice. It also has sample policies. You can view this resource at http://www.sans.org/security-resources/policies/. Policy documents tend to go through a lengthy development and review process. The process can be very time consuming because policies are high-level governance documents from executive management. They have a broad scope and address the whole organization. Most policy development processes include multiple levels of review so that other leaders within the organization have a chance to comment on the policies while they are being developed. These leaders will tell executive management how the policy will affect their units or departments. Policies are rarely changed because they contain language that sets forth general expectations. The broad goals stated in a policy should not need to be changed often. Standards and procedures are used to provide flexibility and are easier to change. An organization can easily update these documents in response to changing technology conditions. Standards Standards support high-level policies and state the activities and actions needed to meet policy goals. They are just below policies in the ISG documents hierarchy. Standards are more specific than policies. Standards may require employees to take (or refrain from) certain actions and often state a minimum level of behavior or actions that must be met to comply with a policy. This is called a baseline. Standards are technology neutral. They do not refer to specific technologies or products. Instead, they refer to the safeguards and controls an organization should use to protect data and IT resources. Several different ISG levels can create standards. They are usually created at the Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. CIO or CISO level. However, an organization’s BOD is not usually involved in creating standards. An organization usually develops standards with input from information security managers because they have overall organizational responsibility for implementing information security. They are the subject matter experts in what it will take to implement the standard. Procedures Procedures are the lowest level of ISG documents. They are step-by-step checklists that explain “how” to meet security goals or conduct security-related activities. Organizations often tailor their procedures to a certain type of technology. They also Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. can be limited to the activities of specific departments or end users. Procedures usually only address single tasks. They are designed to be flexible so they can change as technology changes. Information security managers usually create procedures, although a CIO or CISO may sometimes review procedures. For the most part, however, procedures are department- or technology-specific documents. Governance Documents Work Together Policies, standards, and procedures work together to protect information security. Policies set forth the general expectation. Standards further define those expectations. Procedures tell end users how to comply with the expectations. An example might work as follows: Policy Statement: All employees must use multifactor authentication to access organizational IT resources. Standard Statement: Employees may use any of the multifactor authentication solutions provided by the information security department to access IT systems. Employees may use either the business-provided authenticator application on their mobile device or may use a physical token device. Procedural Statement: To obtain the authentication application or a physical token device, employees must come to the technology center between 8:00 a.m. and 5:00 p.m. from Monday through Friday. Employees must bring their employee identification card and a state-issued identification card to receive access to the application or their token. In this example, an employee knows what the expectation is (“multifactor authentication”), how the expectation is defined (“technology provided by the information security department”), and how to meet the expectation (“go to the technology center”). Guidelines Guidelines are the most flexible type of ISG document. Organizations can issue guidelines for several reasons. They issue guidelines to: Encourage employees to adopt good information security practices Educate employees about security threats and how to respond to them Encourage employees to take action in areas that the organization cannot Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. An organization can use guidelines to give information security advice. They can recommend actions that an employee can apply on his or her own. The guidelines help employees adopt behaviors that improve information security. Sometimes they address specific kinds of employee behavior. They also might address a specific security issue. For example, an organization might create a guideline to help employees learn how to avoid social engineering attacks. Organizations might issue guidelines to address issues that they cannot control through technical measures or organizational authority. This is where the organization needs its employees to help it protect IT resources. They hope that they can encourage employees to read the guidelines and take individual action. Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. For example, an organization may allow its employees to access its IT systems from home because it increases productivity. It allows employees to work from home on days when they otherwise would not be working. (For example, if a parent stays home to care for a sick child or if an office is closed due to a global health pandemic.) Employees may use their home personal computing equipment to complete their work in these situations. However, the organization must safeguard its IT resources from security threats introduced by this activity, such as malware that might be on an employee’s home computer that could be transmitted to the organization’s IT resources. The organization has no real way to make employees use good security practices at home. It has no real authority to require employees to protect their home computers. To encourage employees to secure their home computers, the organization can issue a guideline. The guideline outlines security safeguards that employees can use at home. Following the guideline benefits employees because it helps them secure their own personal data. It also helps protect the organization’s IT resources if the employee follows the recommended practices. Both the employee’s computer and the organization’s IT resources are protected. It is a winning situation for everyone. Creating Information Security Policies Each type of ISG document has a different role and focus. They might be directed at different audiences. They might address similar issues from different standpoints. However, they do share some similarities. These similarities include: They must be easy to understand. They must have a well-defined scope. They must be regularly reviewed. They must be communicated to all employees. First, the documents must be easy to read. All employees must be able to Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. understand them. Even if the subject matter deals with legal issues, the document itself should be free from legalese. The documents should not use technical jargon. The only time it is OK to use complex language is when it is needed to help employees know their responsibilities. Otherwise, these documents must be understandable so that employees can follow them. Second, ISG documents must have a clear scope. They must clearly address a specific aspect of the organization’s security program. Employees should not have to consult many high-level documents to determine the organization’s stance on a single issue. Ensuring that policy scope is clearly outlined helps employees follow the policy. Third, the organization must regularly review its ISG documents. Information Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. security does not exist in a vacuum. Risks change. Laws change. Technology changes. An organization must respond to these changes in its security program. To do this, they must review their ISG documents on a regular basis to make sure that they are current. Finally, an organization must communicate the ISG documents to its employees. Employees cannot follow policies that they do not know about. Good communication makes sure that employees view ISG documents as business enablers. Organizations can communicate ISG documents to employees in several ways. They can use newsletters, in-person and online training, or company-wide email messages. Many communication mechanisms should be used to make sure that employees know about the ISG documents. Policy Development Process An organization should create a structured ISG document development process. It may even want to consider writing a “policy on policies” to specify the formal process. A formal process gives many units, departments, and stakeholders the opportunity to comment on a policy. This is very important for high-level policies that apply to the whole organization. A formal process also makes sure that final policies are communicated to employees. It also provides organizations with a way to make sure that policies are reviewed regularly. Legalese Versus Plain Language Legalese is an unflattering term used to describe legal writing. Legalese is language that uses too many legal phrases and many Latin terms. It usually has long sentences with many commas that are dense and hard to read. Lawyers are needed to translate documents written in legalese. There is a growing trend in the legal profession to write documents in plain language. This means that documents are written in the language that people use when they speak to help make documents more understandable. People can understand these documents faster. They also are less likely to misunderstand them. The trend is to use plain language to write formal documents. However, legalese appears in high-level policies on a regular basis because these documents are formal governance documents. An organization’s Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. legal counsel often writes them. Legalese can make it hard to understand some very simple concepts. This is frustrating for people who need to follow the policies. Some examples of legalese and plain language follow. Are there other ways that you can make these policy statements easier to read? Example 1—Consent Legalese: All users of the organization’s information technology resources, as a condition to the use of such resources, specifically consent to the general rights of the organization as specified herein. Plain Language: All users of the organization’s IT resources agree to the terms of this policy. Example 2—Least Privilege Legalese: Any access permitted hereunder shall be the minimum access required in order to protect the organization’s interests. Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. Plain Language: Access to IT resources is limited to the minimum amount needed. Example 3—Warranties Legalese: The organization makes no warranties of any kind with respect to the organization’s information technology resources it provides. The organization will not be responsible for damages resulting from the use of the organization’s information technology resources, including, but not limited to, loss of data resulting from delays, non-deliveries, missed deliveries, or service interruptions caused by the negligence of an organization employee, or by any user’s error or omissions. The organization specifically denies any responsibility for the accuracy or quality of information obtained through the organization’s information technology resources. Plain Language: The organization provides IT resources “as is.” The organization makes no promises about service level or data accuracy. The organization is not responsible for errors. Use of IT resources is at a user’s own risk. In general, a policy development process should include the following steps: 1. Development 2. Stakeholder review 3. Management approval 4. Communication to employees 5. Documentation of compliance or exceptions 6. Continued awareness activities 7. Maintenance and review The need for a new ISG document is determined in the development phase. The BOD, CIO, or CISO might decide that there is a need for a high-level policy. An information security department might also notice situations that require a new high- level document to guide the organization. The idea for a new ISG document really can come from anywhere in an organization. This section focuses on how high-level policies are created. However, a similar development process is recommended for other ISG documents, such as standards and procedures, as well. Once a policy need is identified, the BOD must determine the goals of the policy. To do this, it reviews several areas. It looks at its use of IT resources and reviews the Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. data that it is legally required to protect. It considers its business objectives. An organization’s CIO or CISO will give advice about information security issues. The BOD also might consider how other companies in the same industry approach a certain type of issue. After this review, the BOD establishes the policy goals. An organization must take care when it drafts high-level policies. It must make sure that a new high-level policy does not conflict with any previously issued policy. Stakeholders must review the draft when it is finished. FYI In drafting an ISG document, it is important to be consistent. A writer should use consistent grammar, punctuation, and format. This makes the document more readable. It also makes it easier for employees to Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. understand the document. At the next step, stakeholders review the ISG draft documents. Stakeholders are interested parties. They are employees and departments that will be affected by the new policy. They also may be subject matter experts in the underlying policy subject matter. IT resource managers also will review the document at this point. They do this to make sure that they can implement technical controls to meet the policy. This also is the step where legal counsel, risk management, and audit will review the document. These groups make sure that the document meets the organization’s regulatory needs. Risk management and audit departments will want to make sure that they can measure policy compliance actions. Legal counsel makes sure that the document helps protect the organization from legal liability. The organization may revise the policy many times during this step. The policy must be signed when it is in final form. The BOD must always review and sign high-level information security policies. Their support is crucial for a successful information security program. They do not always sign lower-level documents. The executive with authority over certain tasks may sign lower-level documents; for example, a CIO or CISO might sign standards or guidelines. Departmental managers and supervisors may sign procedures for their specific areas. Each organization will make its own rules about who needs to approve and sign each level of ISG document. The next step, the communication step, is the most critical step in the development process. Communication is necessary to make sure that all employees know about the new policy. It helps employees know where to find resources to follow the policy. Organizations can communicate new policies in several different ways. Internal newsletters, memos, and company-wide emails can all be used to inform employees about a new policy. As part of the overall development process, an organization must measure policy compliance. It must know how departments act to meet policy requirements. It also must note any exceptions to compliance. An organization can show compliance by documenting the following: Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. When the ISG document was approved How and when it was communicated to employees Actions departments took to meet the responsibilities stated in the ISG document Deviations from the requirements in the ISG document Sometimes departments might request an exception to a policy. They can request an exception for several reasons. For example, a policy might state a technical control that an IT system cannot meet for a very legitimate reason. Or it might require an action that a business unit cannot take because of some other Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. regulatory requirement. Organizations must have a formal way to review policy exception requests. For example, the BOD must review, approve, and document each high-level policy exception request. A BOD might assign this role to an upper management official with technology expertise such as a CIO or CISO. Exception requests from standards and procedures might be handled by the CIO or CISO as well. An organization must carefully consider exception requests. This is because every policy exception weakens the organization’s overall security posture. There are two main reasons to grant a policy exception request. The first is when following the policy negatively affects the organization’s business objectives. This might happen when a policy control interferes with a critical business process. NOTE Compliance is an ongoing process that organizations must continuously monitor. The second reason to approve an exception request is when the cost to comply with the policy is more than the cost of noncompliance. For example, an organization may grant an exception request if a particular IT resource is incapable of technically meeting a policy requirement. It might do this if buying new equipment is too expensive. In those cases, the organization still must implement controls to protect the IT resource. The policy exception request must document how an area will use compensating controls to meet the spirit of the policy. The development process must continually educate employees about policy compliance. Ongoing security training and awareness are required to keep employees aware of their responsibilities. An organization must build regular policy awareness activities into its day-to-day routine. For example, they can be included in other training programs, such as workplace safety programs. Finally, an organization must review its ISG documents on a regular schedule. They must make sure the documents continue to reflect business and information security goals. Sometimes internal or external factors change so much that an Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. organization must change its policies. At this point, it can either update its policy or withdraw it and create a new one. A BOD demonstrates due diligence and reasonable care when it regularly reviews its policies. FIGURE 13-4 shows the policy development process. Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. FIGURE 13-4 Policy development process. Description An organization can adjust the development process if necessary. For example, it might need to create a new policy to respond to a new law. It can step that policy Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. through the development process quickly, then go back and review the document once the urgent regulatory need has passed. In addition, the process can be shortened for some ISG documents. Standards and procedures that apply to one department only may go through an expedited review process. This is because there may not be as many people who need to comment on them. An organization uses ISG documents to support its business objectives and information security goals. These policies form the basis of an information security program. They also set the tone for a culture of information security awareness. Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. Recommended Information Security Policies Information security policies will vary greatly across organizations because all organizations are different. They have different business goals. Their security needs are not the same. Their cultures are different. The list of information security issues to address in a policy is endless. However, all organizations face some basic security issues. They should create policies to address these issues. The basic policies that organizations should consider include: Acceptable use policies Anti-harassment policies Workplace privacy and monitoring policies Data retention and destruction policies Intellectual property policies Authentication and password policies Security awareness and training policies These policies address use of IT resources and the data in those resources. Often information security and human resources (HR) departments will work together on some of these policies. Business and auditing offices might help administer some of these types of policies. Acceptable Use Policies An organization uses an acceptable use policy (AUP) to tell employees how to properly use organizational IT resources. Organizations should consider drafting an AUP because IT resources are valuable business assets. They are often expensive to buy and maintain. They also contain data that is valuable to the organization. Organizations provide employees access to IT resources to support business goals. In addition to system access, many organizations give their employees email Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. accounts and internet access. Some also give their executives mobile devices. Although employees are supposed to use these resources for business purposes, that is not always the case. Employees can use these resources in many non- business ways. Some of these uses include: Sending and receiving personal emails at a work email address Chain mail and hoax email messages sent around the office Non-business internet use (such as online shopping) Accessing social networking sites during work hours Downloading free software (or pirated software) for business or non-business use Grama, J. L. (2020). Legal and privacy issues in information security. Jones & Bartlett Learning, LLC. Created from westerngovernors-ebooks on 2025-02-11 04:08:17. File sharing throughout a workplace or over the internet Improper use of an organization’s IT resources can be costly. It can result in information security compromises, introduce malware onto IT systems, or lead to unintentional data loss. An organization might be legally responsible for an employee’s misuse of IT resources in some instances. Non-business use of IT resources can also distract employees and can lead to lost productivity. An AUP can help prevent some of these issues. An AUP is a code of conduct that states permitted uses of IT resources. It also lists prohibited actions. Finally, it states the consequences for violating the acceptable use rules. An AUP is one of the most important information security policy documents. It can help prevent a wide range of activities that could harm the organization’s IT resources. An AUP can address several concerns including personnel, legal, and information security issues. HR departments like AUPs because they help promote workplace productivity. They also want to make sure that employees are not accessing or sharing objectionable electronic materials. Such behavior can cause severe disruptions in the workplace. In some instances, it also can subject the organization to liability for its employees’ actions. For instance, an employer can be held responsible in some cases where an employee is using IT resources to harass other individuals. AUPs give HR departments a rules-based reason to terminate employees who use IT resources inappropriately. Would an AUP Help in This Situation? The “I Love You” or “Love Bug” worm was discovered in May 2000. At the time, it was thought to be one of the largest and most destructive computer worms ever. It spread via email messages with “ILOVEYOU” in the subject line. The messages included an attachment disguised as a love letter. Once a user opened the attachment (and who would not open a love letter?), the worm infected the user’s computer. It sent itself to everyone in the user’s email address book and destroyed computer files. It also searched for sensitive information and sent it back to its creator. At one point, industry experts estimated that the worm affected computers at more than 80 percent of U.S. businesses. Could an information security policy have helped stop the spread of the worm? What if an AUP Copyright © 2020. Jones & Bartlett Learning, LLC. All rights reserved. stated that employees could not open email attachments that they were not expecting? What if the consequence for opening that type of attachmen