information security policies

/Tag:information security policies

Map of Virus Threat Levels

Click here to view a map of computer virus threat levels.

By | June 6th, 2010|Categories: POPI and Data Protection|Tags: , , |

Measures to be taken by companies to guarantee security of Internet transactions

Section 43(5) of the ECT Act requires the supplier in an electronic transaction to "utilise a payment system that is sufficiently secure with reference to accepted technological standards at the time of the transaction and the type of transaction concerned." [...]

Information Security Policies support Compliance

Information Security policies support compliance in many ways. Vicarious liability Beyond sensitising employees to the risks posed by technology, information security policies minimise the organisation's exposure to vicarious liability for unauthorised or unlawful acts carried out by employees during the [...]