Information Security Policy

Information Security Policy

Lech J. Janczewski, Andrew M. Colarik
ISBN13: 9781591405832|ISBN10: 1591405831|ISBN13 Softcover: 9781591405498|EISBN13: 9781591405504
DOI: 10.4018/978-1-59140-583-2.ch013
Cite Chapter Cite Chapter

MLA

Lech Janczewski and Andrew Colarik. "Information Security Policy." Managerial Guide for Handling Cyber-Terrorism and Information Warfare, IGI Global, 2005, pp.199-212. https://doi.org/10.4018/978-1-59140-583-2.ch013

APA

L. Janczewski & A. Colarik (2005). Information Security Policy. IGI Global. https://doi.org/10.4018/978-1-59140-583-2.ch013

Chicago

Lech Janczewski and Andrew Colarik. "Information Security Policy." In Managerial Guide for Handling Cyber-Terrorism and Information Warfare. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-583-2.ch013

Export Reference

Mendeley
Favorite

Abstract

In Chapter 12, we discussed most of the information security issues that are important to IT managers, especially in the current situation of increased attacks. Perhaps the most visible and important document that relates to the attitude of management towards security issues is the Information Security Policy (ISP). (Please note that the most common understanding of the abbreviation ISP is Internet Services Provider. For clarity within this chapter only, ISP means Information Security Policy.) This document reflects all the decisions and activities required to set up a clear set of rules and procedures for company employees in terms of protecting information assets. The ISP is also used to:

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.