1 INFORMATION SECURITY POLICY Information security policy Theinformationsecuritypolicyisasetofruleswhichindicatehowthedigital information is being handled in the business. The resources used to build new information security policy are security articles, templates and guidelines which provide lot of information directly related to information security policies contain valuable security knowledge. The business should have written security policy for demonstrating the data privacy as well as security of the company (Safa, Von Solms, & Furnell, 2016). Those resources provide body of knowledge on the security processes, security practices, data attack, damage to the network and unauthorized access to the network and confidential data. The two items that new security policies are included: password policy and acceptance use policy for email. The password policy has importance in the business as it can set of the rules which are designed to enhance the security of computer by providing the users with stronger passwords. It is a part of official regulations of the company and taught to the employees as division of safety awareness training. In the organization, there is importance of email policy whichconsistsofdocumentsforoutlininghowtheemployeesareusedelectronic communicational tools (Peltier, 2016). This policy can set guidelines that the user should agree to access the corporate network and internet. This policy document provides the employees a statement about usage of network and internet. It outlines benefit of email system as it has ability to gain information from the internet and connected with people throughout using instant messaging.
2 INFORMATION SECURITY POLICY References Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications. Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations.Computers & Security,56, 70-82.