Executive Roles and Responsibilities

1800 Words4 Pages

Executive Roles and Responsibilities

In any corporate setting or military installation, a need to define proper boundaries and procedures for safeguarding data can be a daunting and sometimes a seemingly impossible task. Delineating, clarifying, and communicating the responsibilities for protecting and defending information resources is the first step in creating a culture that is sensitive and responsive to information security issues.

A busy executive with a data integrity mind set has to control information coming in, through its processing phases and ending in the customers hands as a usable product. Free from any modification and as accurate as it can possibly be, If they get the information at all. (DOS in mind). Information security executive needs to ensure that the organization has procedures for account management, backup, incident handling, standardized and authorized software and hardware, disaster recovery, and a Continuity of Operations Plan, or COOP. Moreover, identifying whom is responsible for what plays an important role as well.

Account management procedures define when and how new users should be added and when other users should be removed from the system. Password control may be included here. I have been apart of the Navy active and Reserve components for 8 years, working as either a Cryptologic Technician Operator (Communication) or Assistant ISSO for Operations department. One thing that has remained in tact if not for security purposes, for resource monitoring and control, was the management of accounts. The deletion and creation of accounts had a set of people usually two assigned to just that task. Moreover, account management also is used for punishment purposes and not just the controlli...

... middle of paper ...

...ng and for ensuring the confidentiality, integrity, and availability of sensitive data and information by safeguarding their workstations. All personnel are also responsible for assuring computer password protection, complying with the regulations concerning email, and for reporting suspected violations of security.

Guidelines and procedures are key links between policies, personal and organizational responsibilities. The level of detail in the procedures will vary depending upon the size and needs of the organization's information assurance program. These guidelines and procedures are made and enforced by your senior level executives but are the responsibility of each member of the staff. It only takes one with sloppy handling of information to take down a whole organization.

Open Document