Notifying Information Security Weaknesses

Information Security weakness can manifest themselves in the area of software and physical access to restricted areas. For details of physical access weaknesses refer to Dealing with Premises Related Considerations. This topic discusses structures for reporting software Information Security weaknesses, in both operating systems and applications.

To view the related Policy click      

  • Where there is no procedure to report Information Security weaknesses, inexperienced staff may try to correct an Information Security weakness in an application program or an operating system and interrupt business critical processing.

There are multiple Key Actions providing safeguards against this Information Security Issue. These are available in the registered version of RUSecure™.

Previous PageTop of this pageNext Page


Information Security Policies from US$595

 From
 US$595

Use of the guidance contained within RUSecure™ is subject to the End User Licence Agreement
This site created with EasyHTMLHelp(tm) for MS Word

 

Next PageUpPrevious Page