IT Governance, Risk, and Compliance

May 6 2011   10:09PM GMT

Effective Employment Practices for Protecting IT – Part I



Posted by: Robert Davis
Tags:
Conduct Code
Due Care
Due Diligence
Employment Practices
Information Assets Protection
Misappropriation of Assets

Based on extensive research by various knowledge leaders, the greatest harm or disruption to IT-based information services emanates from intentional or unintentional actions of internally employed individuals. Frequently, information systems experience disruption, damage, loss or other adverse impacts due to the well-intentioned actions of employees authorized to use or maintain IT objects. Therefore, securing reductions in harm or disruption to furnished IT services mandates emphasizing and periodically reemphasizing defined rules of behavior to individuals employed by the entity.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: