The IT Security Incident Handling Procedure details the steps for reporting any actual or suspected IT security problem. The security incident handling procedure also addresses security issues related to the safety, confidentiality, availability and integrity of information maintained on your company’s IT system.
The IT Security Incident Handling Procedure applies to your company’s remote data terminals, desktop and portable computers, data centers, and telecommunications facilities, as well as all data, hardware and IT personnel. (10 pages, 1485 words)
IT Security Incident Handling Responsibilities:
The Incident Response Handling Team is responsible for investigating actual or suspected Information Technology incidents, resolving such incidents, and reporting on incident responses.
The Help Desk is responsible for reporting potential security incidents to the Information Technology Security Manager.
The Human Resources Manager is responsible for facilitating training of the Incident Response Team.
Information Technology Managers are responsible for reviewing the Information Technology Incident, reports, and their handling.
The Information Technology Security Manager is responsible for developing the Information Technology Incident Handling Plan, building an Incident Response Team, assigning incidents to the IRT for resolution, reporting incidents and responses to the Security Review Committee, and updating the Information Technology Incident Handling Plan, as needed.
IT Security Incident Handling Definition:
Information Technology security incident – An actual or suspected occurrence of unauthorized (intentional or unintentional) use, loss, disclosure, modification, or destruction of Information Technology hardware, software, or information.
There are no reviews yet.
Easily develop your Computer & IT Policies and Procedures Manual to standardize your IT Operations with editable MS-Word templates. Use best practices to manage IT vendor management, IT security, IT assets, software development, and administration. Download your IT policy manual now.More >>