Notifying Information Security Weaknesses

Information Security weakness can manifest themselves in the area of software and physical access to restricted areas. For details of physical access weaknesses refer to Dealing with Premises Related Considerations. This topic discusses structures for reporting software Information Security weaknesses, in both operating systems and applications.

To view the related Policy click      

  • Where there is no procedure to report Information Security weaknesses, inexperienced staff may try to correct an Information Security weakness in an application program or an operating system and interrupt business critical processing.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

Previous PageTop of this pageNext Page

Information Security Policies from US$595


Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word


Next PageUpPrevious Page