Information Security Human Resource management

Source: Internet
Author: User

Human Resource security

iso27001:2013

Pre-Appointment

To ensure that employees, third-party personnel understand their responsibilities, and consider the role they assume is appropriate

In Appointment

Ensure that all employees and third party personnel are aware of and fulfill their informatics security responsibilities

Termination or change of appointment


Incorporating the interests of the protection organization into the process of human change or termination

1. Review

1.1 Background survey on candidates for all

Includes: identity information, education information, previous position, job performance, work integrity, etc.

Focus on key positions and focus reviews (care to protect personal privacy)

Terms and conditions for 1.2 persons

Signing Information security responsibility

form of expression: Labor contract, confidentiality agreement

Content Focus: The responsibility of informatics security, Xu Protection of information assets, confidentiality period

Note: All contracts and agreements need to be audited by legal department or lawyer


Appointments-Information security ceremonies, education and training

1.1 Information security ceremonies, education and training

Novelty and variety, content lively

Can only be associated with the post, regularly updated and carried out

Broad coverage, onboarding, on-site or online training, induction exams

1.2 Management responsibility and disciplinary process

Management responsibility managers are advised to require all employees and external users to secretly organize established policies and procedures for security


Try

The disciplinary process has a formal and communicated disciplinary process to deal with employees who violate security breaches.

Managers at all levels assume responsibilities

Incorporating new messaging security into departmental and employee performance metrics (2%-5%)

Moderately rewarding, effective implementation


termination or change of human use

The information security responsibilities and obligations that are still valid after termination or change shall be defined and transmitted to employees and external personnel


Reach and implementation

Information security control points infiltrate transfer and rational process

Information asset recovery, access rights cleanup

Positive and effective communication



This article from "No Twin Cities" blog, reproduced please contact the author!

Information Security Human Resource management

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.