Page 24 - PowerPoint Presentation
P. 24

•  Notify human resources to issue a final paycheck, pay any unused vacation
                              time, and terminate benefit coverage.
                          •  Arrange for a member of the security department to accompany the released
                              employee while they gather their personal belongings from the work area.
                          •  Inform all security personnel and anyone else who watches or monitors any
                              entrance point to ensure that the ex-employee does not attempt to reenter the
                              building without an escort.

               Figure 2.3 Ex-employees must return all company property












               Vendor, Consultant, and Contractor Controls

                       Vendor,  consultant,  and  contractor  controls  are  used  to  define  the  levels  of
               performance,  expectation,  compensation,  and  consequences  for  entities,  persons,  or
               organizations that are external to the primary organization. Often these controls are defined
               in a document or policy known as a service-level agreement (SLA).

               Compliance

                       Compliance  is  the  act  of  conforming  to  or  adhering  to  rules,  policies,  regulations,
               standards,  or  requirements.  It  is  related  to  whether  individual  employees  follow  company
               policy and perform their job tasks in accordance to defined procedures.

               Privacy

               Some partial definitions of privacy:

                   •  Active prevention of unauthorized access to information that is personally identifiable
                       (that is, data points that can be linked directly to a person or organization).
                   •  Freedom from unauthorized access to information deemed personal or confidential.
                   •  Freedom from being observed, monitored, or examined without consent or
                       knowledge.

               Many US regulations include privacy requirements. The following are a few examples:

                   •  Health Insurance Portability and Accountability Act (HIPAA)
                   •  Sarbanes-Oxley Act of 2002 (SOX)
                   •  Gramm-Leach-Bliley Act
                   •  EU’s Directive 95/46/EC (aka the Data Protection Directive)
                   •  Payment Card Industry Data Security Standard (PCI DSS)

                                                 Security Governance

               ITEC106 – Systems Security                                       Mr. John Mark L. Dula
   19   20   21   22   23   24   25   26   27   28   29