Information Security Breach Paper

693 Words2 Pages

Litigation
An information security breach that compromises data can expose a non-profit to litigation from donors, employees, vendors, and suppliers. Just like any other organization, records stored by a non-profit organization may contain confidential donor data, medical information, organizational data, and credit card information (Hrywna, 2007; Donohue, 2008). As a result of a data breach, donors of a non-profit may file a lawsuit to recover damages from exposure of their sensitive data (Brenner, 2007; Parry, 2005). Non-profit organizations do not comprehend the risk of losses due to an information security failure until they face a lawsuit (Nobles, 2008).
Implementing a Security Awareness Program
Based on the contents of the NIST Special …show more content…

Carefully positioning the program sponsorship sends a clear message to the entire organization emphasizing the importance of the information security program. Additionally, approval from the senior management will ensure adequate resources for developing and implementing the awareness plan. (Wilson, M. & Hash, J,2003) Assemble a Team
Create a team with the following areas of expertise: Human Resources (HR), Legal, Technology, and other key business lines. The HR, Legal, and Technology team members will have a good understanding of the current policies related to information security. Moreover, such a team will be a fair representation of each area of the organization. Information Security Awareness needs to be an organizational-wide effort and must be presented in the same manner. (Wilson, M. & Hash, J,2003)
Assess the Environment
The security awareness team should review current policies and procedures to ensure that they are satisfactory and current. Strengths and weaknesses of each existing policy should be assessed. If there is an absence of sufficient policies, new policies should be developed. Policies must have a scope, intended audience, a clear instruction, and reasonable disciplinary action for violation of policy. (Wilson, M. & Hash,

More about Information Security Breach Paper

Open Document