This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Plays

IT Security Policy Enforcement

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

IT Security Policy Enforcement

It is worth noting that security policy happens to be the foundation of information security in any company. However, compliance with the security policy is not always an easy task as it revolves around translating the written security policy into action. It is something that needs careful planning as well as the participation of all related parties. As far as this is concerned, it becomes of great significance to note that the monitoring process is significant primarily because new threats and also technologies appear as a result of the changing environment as well as operations of the company. This is to imply that monitoring can be used in enforcing security policies (Erlingsson, 2003). In this case, it becomes imperative to review the security policy continuously as the means to maintain the relevancy of the content. Monitoring plays a tremendous role in enforcing security policies because it allows an organization to track down what is working or what needs to be improved for effectiveness. Monitoring is an enforcement mechanism that there is no violation of the security policy being enforced.

Various legal implications may be experienced when a company attempts to enforce its security policies. For instance, for international businesses, implementing security policies may be challenging as they have to comply with laws as well as regulatory developments that affect cybersecurity on a global scale. As far as this is concerned, it is essential to remember that each nation has its own, often different laws, including regulations. For instance, HIPAA in the United States imposes particular security-related requirements, especially when it comes to the healthcare industry. It is worth noting that organizations are forced to contend with a patchwork of various laws that affect security (Mazurelle, Thiebaut, & Wouters, 2009). For instance, security requirements under national data protection laws that, to a great extent, implement the EU Data Protection Directive can vary greatly from nation to nation. The existence of these security obligations and measures make it a bit challenging for an organization to implement their security policies.

Automated policy enforcement is configured into a device as the means to enforce a security policy. It is worth noting that the significance of automated policy enforcement revolves around the idea that it allows the company to innovate as well as evolve with certainty, realizing that critical policies and also standards will at all times be upheld (Auvenshine, et al., 2015). On the other hand, manual policy enforcement is more based on work that needs human judgment. In this case, volumes are low, and it is firmly believed that the process requires human judgment. However, it is proper for both the step and the criteria to be clear. Therefore, manual policy enforcement focuses on small volumes, and there is no use of devices like in automated policy enforcement.

There exist practices that I firmly believe ought to be considered when it comes to enforcing an organization’s security policies. For instance, it is always proper to ensure that these security policies conform to legal requirements. It is worth noting that a company may be needed to conform to certain minimum standards, especially where the organization holds personal information. An excellent way of mitigating any liabilities a company may incur is to have what can best be identified as a viable security policy being documented (Furnell, et al., 2007). Additionally, it would be proper to avoid being overzealous. This is primarily because too many security policies can be as bad as too little security policies. As far as this is concerned, it becomes necessary to discover that excessive security can emerge as a hindrance to smooth business operations.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask