Security Policies

indysingh7285
Mind Map by indysingh7285, updated more than 1 year ago
indysingh7285
Created by indysingh7285 over 4 years ago
129
1

Description

A-Level ICT Mind Map on Security Policies, created by indysingh7285 on 10/19/2015.
Tags

Resource summary

Security Policies
1 Legal Compliance
1.1 Data Protection Act 1998
1.2 Computer Missuse Act 1990
1.3 Copyright, Designs and Patenets Act 1998
2 Usernames/Passwords
2.1 Must be kept confidential
2.2 Forbids use of others people
3 Forbid Non-Institutional Use
4 Equipment
4.1 Cannot be moved without permission
4.2 Cannot attach to network without permisson
5 Uses
5.1 Must not damage ICT facilities
5.2 Must not modify software
5.3 Minimise use of consumables
5.4 No food/drink in ICT rooms
5.5 Avoid annoyance to others
6 Health and Safety
6.1 Compliance with Health and Safety laws
6.2 Adopt safe working practices
7 Penalties for Infringement
7.1 Legal penalties
7.2 Disciplinary action
Show full summary Hide full summary

Similar

ISACA CISM Exam Glossary
Fred Jones
CCNA Security 210-260 IINS - Exam 3
Mike M
MICROSOFT WORD 2013 SKILLS FOR WORK
John O'Driscoll
Types and Components of Computer Systems
Jess Peason
All AS Maths Equations/Calculations and Questions
natashaaaa
Using GoConqr to teach science
Sarah Egan
Using GoConqr to study English literature
Sarah Egan
Using GoConqr to study Economics
Sarah Egan
Using GoConqr to study geography
Sarah Egan
Using GoConqr to learn French
Sarah Egan
Using GoConqr to teach French
Sarah Egan