Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

For sample purposes only

XYZ'S ISMS POLICY

OBJECTIVE

XYZ's objective of managing information security is to ensure that its core and
supporting business operations continue to operate with minimal disruptions. XYZ shall
ensure that all information that are disbursed or produced by XYZ have absolute integrity.
XYZ shall guarantee that all relevant information are managed and stored with
appropriate confidentiality procedures.

POLICY

• The purpose of the Policy is to protect the organization’s information assets1 from
all threats, whether internal or external, deliberate or accidental.

• The Managing Director has approved the Information Security Policy.

• It is the Policy of the organization to ensure that:

o Information should be made available with minimal disruption to staff and


the public as required by the business process2;

o The integrity of this information will be maintained3;

o Confidentiality of information not limited to research, third parties,


personal and electronic communications data will be assured4;

o Regulatory and legislative requirements will be met5;

o A Business Continuity Management Framework shall be made available


and Business Continuity plans will be produced to counteract interruptions
to business activities and to protect critical business processes from the
effects of major failures or disasters. Business continuity plans should be
maintained and tested6;

o Information security education, awareness and training will be made


available to staff7;

o All breaches of information security, actual or suspected, will be reported


to, and investigated by the relevant authorities not limited to System
Administration and Incident Response8;

o Appropriate access control will be maintained and information is protected


against unauthorized access.
For sample purposes only

• Policies, Procedures and Guidelines not limited to Information Security will be


made available in both hardcopy and online format through an intranet system to
support the ISMS Policy.

• Internal Audit Unit has direct responsibility for maintaining the ISMS Policy and
involved with writing and/or managing the development of relevant policies,
procedures and guidelines not limited to information security.

• All managers are directly responsible for implementing the ISMS Policy within
their units, and for adherence by their staff.

• It is the responsibility of each member of staff to adhere to the ISMS Policy.

• Information security is managed through XYZ’s Risk Management framework.

• The availability of information and information systems will be met as required by


the core and supporting business operations.
___________________________
1
Information takes many forms and includes data stored on computers, transmitted
across networks, printed out or written on paper, sent by fax, stored on tapes and
diskettes, or spoken in conversation and over the telephone.
2
This will ensure that information and vital services are available to users when
and where they need them.
3
Safeguarding the accuracy and completeness of information by protecting against
unauthorized modification.
4
The protection of valuable or sensitive information from unauthorized disclosure
or unavoidable interruptions.
5
This will ensure that the organization remains compliant to relevant business,
national and international laws and it include meeting the requirements stated in
legislations such as the Malaysian Copyright Act 1987, Companies Act and the
Data Protection Act.
6
Business Continuity Management should be implemented effectively to ensure
continuity of business operations in the event of a crisis or disaster.
7
Ensure that relevant and effective trainings are provided to staffs.
8
Ensure that the staff understand their roles and responsibilities in handling
incidents and have a comprehensive and well-tested incident response plan ready.

The policy will be reviewed by XYZ’s ISMS Forum after a one-year duration for update.

You might also like