logo

Issue-Specific Support Policy

   

Added on  2023-03-30

6 Pages1200 Words109 Views
 | 
 | 
 | 
Running Head: MANAGEMENT 0
Issue-Specific Support Policy
Issue-Specific Support Policy_1

MANAGEMENT 1
Introduction
The issue- specific security policy (ISSP) is established to plan the strategies which
will manage the technologies in the organization. ISSP can be explained as systematic rules
which are to be followed by employees concerning to the proper use of technology. This
policy states the technology and update is required regularly. The policy also includes the
matters related to the use of personal equipment, regular updates of software, usage of
photocopy tools, where company email is to be used ( Anderson, 2017).
This paper will state the purpose of ISSP and explain the functions, components of
ISSP and the ways to manage the ISSP document.
Purpose of ISSP
The purpose of issue-specific security policy is to provide the guidance to the
organization to use the technology safely and to protect the organization and employees from
uncertainty and inadequacy. This policy also helps to minimize the risk and helps to comply
with the regulations and laws. The ISSP prepares the documents regarding the control of
technology. This policy is required because it assists the employees in the organisational
needs and direction. The ISSP has the authority to compensate the organization against
charge due to the employee’s illegal and inappropriate usage of system ( Carroll & Arkin,
2015).
Function of ISSP
The several technologies are implemented and guidelines are provided to use
properly.
Issue-Specific Support Policy_2

MANAGEMENT 2
The three function described here are specific technology based resources, frequent
updates, and issue statement describing the position of organisation on specific matter. The
specific technology based resources includes usage of internet, e-mails, installation,
communication, immediate messaging, phone, fax, using the equipment of scanning and
photocopy and even using the personal equipment on networks of company (Liang, 2016).
The second function is frequent updates which means the changes will be required in
technology and equipment and also the update is required if there is change in the job
functions of the members of organisation. The ISSP must be a living document which means
it should be updated continuously. The alteration is required if the teleworking is allowed.
The frequent updates are necessary so that the technologies and equipment can be updated
timely otherwise the equipment and technology will be out of date. The third function is the
issue statement describing the position of organisation on specific matter. This function
describes that the company will be not liable for the illegal or inappropriate activities
committed by employees. When the employee will breach the policy or law for the
technologies owned by company than this is not the responsibility of company to protect the
employees (Soomro, 2016).
Component of an ISSP
Statement of purpose
The first component of an ISSP is the Statement of Purpose. The statement of purpose
means the policy should commence with the proper statement of purpose. The statement of
purpose includes the scope of policy, defines the responsibility and accountability for
implementing the policy and the policy applicability. The statement also gives the brief
overview regarding the technology. This defines who will be responsible for the particular
technology. The statement of purpose is first component because it explains about the
Issue-Specific Support Policy_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Awareness: Importance, Types of Policies, and Strategies for Protection
|7
|2173
|1

Rules and Regulations in IT Ethics Assignment
|7
|1244
|93

Adept Owl Electronic Communication Policy PDF
|37
|7337
|145

Risk Analysis and Possible Controls for a Small Part of a Business System
|8
|1727
|497

Business Resources Assignment: ASDA
|12
|2859
|149

TNE80011 Secure Remote Access Networks
|13
|3268
|160