IT Governance, Risk, and Compliance

May 6 2011   10:09PM GMT

Effective Employment Practices for Protecting IT – Part I

Robert Davis Robert Davis Profile: Robert Davis

Based on extensive research by various knowledge leaders, the greatest harm or disruption to IT-based information services emanates from intentional or unintentional actions of internally employed individuals. Frequently, information systems experience disruption, damage, loss or other adverse impacts due to the well-intentioned actions of employees authorized to use or maintain IT objects. Therefore, securing reductions in harm or disruption to furnished IT services mandates emphasizing and periodically reemphasizing defined rules of behavior to individuals employed by the entity.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: