Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Prohibited

Handbook of Research on Information Security and Assurance
use is illegal use and all other use that is neither Acceptable nor Allowable.
Published in Chapter:
Information Security Policies: Precepts and Practices
Sushil K. Sharma (Ball State University, USA) and Jatinder N.D. Gupta (The University of Alabama at Huntsville, USA)
Copyright: © 2009 |Pages: 6
DOI: 10.4018/978-1-59904-855-0.ch029
Abstract
The purpose of the information security policy is to establish an organization-wide approach to prescribe mechanisms that help identify and prevent the compromise of information security and the misuse of organization’s data, applications, networks, and computer systems to define mechanisms that protect the organization from its legal and ethical responsibilities with regard to its networks’ and computer systems’ connectivity to worldwide networks. Most of the organizations worldwide already have formulated their information security policies. Having a security policy document in itself is not enough, the document must be complete. This paper examines security policies of 20 different academic organizations with standard security policy framework and attempts to answer questions such as: are these security policy documents complete? Are they fully up to date? Does the precept match the practice? These are kind of questions that are addressed in this study.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR