Page 4 - Information_Security_Program
P. 4

INFORMATION SECURITY PROGRAM
                                                                                                          C‐306
                                                                                                 Effective Date:
                                                                                  Last Review Date:  04/12/2017
                                                                                    Next Review Date:  08/09/2018





            Policy Title:              Information Security Program Policy


            Authorized by:
                                     Jeff Uecker, Chief Financial Officer

            Applicable to:           All employees responsible for the security of organizational data – see page 2
                                     of the program document for details

            Purpose:                 To outline the laws and procedures governing how GESM protects the data it
                                     handles.


            Policy Statement:        It is the policy of Goodwill‐Easter Seals Minnesota to protect people’s
                                     information in a manner that complies with the law and respects the privacy
                                     of the persons to whom the information belongs.

            Procedure:                Be informed and responsible for protecting the data you handle according
                                      to the standards outlined in this program document.

                                      Page 1 of the program (page 3 of this policy document) contains a table
                                      of contents which links to the relevant sections of the program.

                                      Pages 2‐3 of the program (page 4‐5 of this policy document) clarifies
                                      which portions of the program are applicable to which positions.



            Definitions:

            Who is Responsible:       Various – see page 2 of the program document

            Action Required:         n/a

            Related Policies &       n/a
            Procedures:


            Context/Statutory        n/a
            Requirements:



                                                                                                          2| P a g e
        GES CONFIDENTIAL
   1   2   3   4   5   6   7   8   9