Protecting ICT Systems

HideShow resource information
View mindmap
  • Procedures for protecting ICT systems
    • Separation of Duties
      • No one person being responsible for a process
      • Helps prevent fraud
    • Non-Disclosure
      • Protects business data from falling into competitors' hands
      • Protects personal data
    • Training
      • Prevents user mistakes
      • Makes users aware of responsibilites
    • Acceptable use policy
      • Document outlining what employees can and can't do
      • Enforced by disciplinary action

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »