KMU Information Securiy Policy

出自KMU Wiki

(修訂版本間差異)
跳轉到: 導航, 搜索
在2013年11月29日 (五) 09:12所做的修訂版本 (編輯)
Cch (對話 | 貢獻)

←上一個
當前修訂版本 (2025年3月6日 (四) 10:50) (編輯) (撤銷)
Cch (對話 | 貢獻)

 
第1行: 第1行:
-<pre>+Please Reference
-Kaohsiung Medical University Information Security Policy+
-Document No. IS-A-001+[https://olis.kmu.edu.tw/index.php/zh-tw/%E9%97%9C%E6%96%BC%E6%9C%AC%E8%99%95/%E8%B3%87%E5%AE%89%EF%BC%8F%E5%80%8B%E8%B3%87%EF%BC%8F%E6%99%BA%E8%B2%A1/%E8%B3%87%E8%A8%8A%E5%AE%89%E5%85%A8%E6%94%BF%E7%AD%96 資訊安全政策]
- +
-Confidentiality level general+
- +
-Revision 1.3+
- +
-1. OBJECTIVE+
-The set of policies aimed at ensuring Kaohsiung Medical University (hereinafter referred to as the school) +[https://olis.kmu.edu.tw/index.php/zh-tw/%E9%97%9C%E6%96%BC%E6%9C%AC%E8%99%95/%E8%B3%87%E5%AE%89%EF%BC%8F%E5%80%8B%E8%B3%87%EF%BC%8F%E6%99%BA%E8%B2%A1/%E5%80%8B%E4%BA%BA%E8%B3%87%E6%96%99%E4%BF%9D%E8%AD%B7%E7%AE%A1%E7%90%86%E6%94%BF%E7%AD%96 個人資料保護管理政策]
-belongs information assets confidentiality, integrity and availability, and comply with the requirements of +
-relevant laws and regulations, harmless from internal and external threat of deliberate or accidental .+
-2. SCOPE+[https://olis.kmu.edu.tw/index.php/zh-tw/%E9%97%9C%E6%96%BC%E6%9C%AC%E8%99%95/%E8%B3%87%E5%AE%89%EF%BC%8F%E5%80%8B%E8%B3%87%EF%BC%8F%E6%99%BA%E8%B2%A1/%E9%9A%B1%E7%A7%81%E6%AC%8A%E6%94%BF%E7%AD%96 隱私權政策]
- +
-Information security management covers 11 management issues, to avoid human error, deliberate or natural +
-disasters and other factors, resulting information is not When using, leakage, tampering, destruction, +
-violations occur, our school has brought a variety of possible risks and hazards. Management issues are as +
-follows:+
- +
-2.1 Information security policy setting and evaluation+
-2.2 Information security organization+
-2.3 Information asset classification and control+
-2.4 Safety of personnel management and training+
-2.5 Physical and environmental security+
-2.6 Communication and job security management+
-2.7 Access control security+
-2.8 Safety system development and maintenance+
-2.9 Information security incident response and handling+
-2.10 Business continuity operations management+
-2.11 Regulations and compliance policy implementation units+
- +
-Our school internal staff, outsourcing vendors and visitors and should comply with this policy.+
- +
-3. TARGET+
- +
-Our school colleagues should maintain the confidentiality, integrity and availability of our information +
-assets and protect user data privacy to achieve the following targets:+
- +
-3.1 Protection of our business activities information from unauthorized access.+
-3.2 Protection of our business activities information from unauthorized modifications to ensure that it is +
- correct and complete.+
-3.3 IT business continuity establish operational plans to ensure the continued operation of our business +
- activities.+
-3.4 School's activities shall comply with the implementation of the requirements of relevant laws or +
- regulations.+
- +
-4. RESPONSIBILIEY+
- +
-4.1 School's management to establish and review this policy.+
-4.2 Information security managers through appropriate standards and procedures to implement this policy.+
-4.3 All personnel and outsourcing services vendors are required in accordance with relevant safety management +
- procedures to maintain information security policies.+
-4.4 All officers are responsible for reporting information security incidents and of any identified weaknesses.+
-4.5 Any compromise information security behavior , depending on the seriousness will pursue its legal +
- responsibility and administrative responsibility according to the school or the relevant provisions of +
- punishment .+
- +
-5. REVIEW+
- +
-This policy should be reviewed at least annually once only , to reflect the government decree , the latest +
-technology and business development status , to ensure that the school forever Continued operation of network +
-services and the provision of academic ability .+
- +
-6. IMPLEMENTATION+
- +
-6.1 Information security policy management review meetings with the information security policy audits.+
-6.2 This policy will be "Information Security Committee" after the implementation of the resolutions , +
- amendments are made.+
- +
-</pre>+
- +
-[[Image: KMU-EDU-ISMS-Cert2013.jpg]]+

當前修訂版本

Please Reference

資訊安全政策

個人資料保護管理政策

隱私權政策