Process of information security, Other Subject

Process

The terms reasonable and prudent person, due diligence and due care have been used in the fields of Securities, Finance, and Law for a lot of years. In recent years these terms have found their method into the fields of computing and information safety. U.S.A. Federal Sentencing strategy now make it possible to hold corporate officers liable for failing to work out due care and due diligence in the organization of their information systems. In the business world, customers, business partners, stockholders and governments have the expectation that corporate officers will run the business in agreement with accepted business put into practice and in compliance with laws and other narrow necessities. This is often described as the "reasonable and prudent person" rule. A cautious person takes due concern to ensure that everything required is done to operate the business by noise business principles and in a legal ethical manner. A cautious person is also hard-working (mindful, attentive, and ongoing) in their due care of the business.

In the field of Information Safety, Harris presents the following definitions of due care and due diligence.

"Due care are steps that are taken to demonstrate that a corporation has taken responsibility for the behavior that take place within the corporation and has taken the essential steps to help protect the corporation, its resources, and employees." And, [Due diligence are the] "continual behavior that make certain the security mechanisms are repeatedly maintained and operational."

Notice should be made to two significant points in these definitions. First, in due care, steps are in use to show - this means that the steps can be established, measured, or even produce touchable artifacts. Second, in due industry, there are continual activities - this assets that people are actually doing things to observe and protect the guard mechanisms, and these behavior are continuing.

Posted Date: 10/13/2012 2:27:55 AM | Location : United States







Related Discussions:- Process of information security, Assignment Help, Ask Question on Process of information security, Get Answer, Expert's Help, Process of information security Discussions

Write discussion on Process of information security
Your posts are moderated
Related Questions
QUESTION 1 "It is due to the efforts of peace-keeping organizations that the world has not yet witnessed a Third World War. The United Nations serves its role effectively throu

How did black artists, musicians, filmmakers, and writers negotiate the dilemma of dual consciousness as articulated by DuBois? Which part of black art did white corporate executiv

To write an informative speech for presentation on "The importance of pre-school education in Singapore"

Importance of natural resource geography: The importance of natural resources geography has grown in the light of its study of the geographic aspects of the conservation and reple

SOLVE is an interactive educational programme designed by the ILO to assist in the development of policy and action to address psychosocial hazards or problems at workplaces. The

(a) Briefly explain five causes of depression. (b) What are the signs and symptoms of depression? (c) Is biological therapy better than psychological therapy to treat depr

functions of a library catalogue

Hello  Please suggest me process of online tutoring? Please reply ASAP

Maizee Hospital is a 300-bed hospital in Nishingwa, Montana. It is part of a small investor-owned hospital chain, Corporation of Hospitals of America's Inland Northwest (CHAIN).

1. Use of the internet has acquired its own rules and conventions for interaction known as Netiquette. In your GU100 Student Success course you were introduced to the Netiquette ru