The purpose of the Information Security Incident Handling Policy is to develop a framework for timely and effective handling of information security incidents. An information security incident is a suspected or confirmed violation of the integrity, availability or confidentiality of the corporate information that could cause or has caused harm to Company.
The detection of potential information security incidents constitutes an action according to which it is timely identified and at the same time protects against real incidents intended to compromise the security of the Company.
Information security incidents are driven in most cases by intentional or inadvertent actions. Examples of such incidents include systems malfunction, interruption of IT Services provision, human errors, unauthorized access, unexpected results after changes to IT systems as well as breach or bypass of the in-place security controls. Prior to responding on such incidents either by directly restoring the affected IT systems to the latest stable condition or by investigating the incident itself (in terms of incident nature, extent, etc.), it is advisable to perform a risk assessment as well as a business impact assessment.
1.1 PROCEDURE OWNER
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3.1 GENERAL ISSUES
3.2 IDENTIFICATION AND EVALUATION OF INFORMATION SECURITY INCIDENTS
3.3 LIMITATION OF SECURITY INCIDENTS
3.4 INCIDENT DETECTION AND ELIMINATION
3.5 INFORMATION SYSTEMS RECOVERY
3.6 SECURITY INCIDENTS ANALYSIS
3.7 LEGAL AND DISCIPLINARY PROCEDURES
3.8 THIRD PARTIES UPDATE
5. FINAL CONSIDERATIONS
5.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
5.2 DOCUMENT REVISION
The Desktop Usage Policy is intended to maintain the security of Company information processing on desktop computers equipment against the risks associated with the exposure or loss of sensitive, unique or personal information.