DatasheetQ Logo
Electronic component search and free download site. Transistors,MosFET ,Diode,Integrated circuits

TA2000 データシートの表示(PDF) - Unspecified

部品番号
コンポーネント説明
メーカー
TA2000 Datasheet PDF : 164 Pages
First Prev 21 22 23 24 25 26 27 28 29 30 Next Last
Information Security Administration 23
Information Security Administration
Overview
DST‟s Information Security Administration group is responsible for the
confidentiality, integrity and availability of DST‟s information resources through the
establishment, implementation and management of the Information Security Program.
This involves creating, administering and overseeing policies to ensure the prevention,
detection, containment and correction of security breaches. The purpose of the
Information Security Program is to ensure that management, Internal Audit and
regulators are satisfied with the security controls that DST has implemented and that
clients and business partners are confident their information is adequately protected.
Information Security Administration‟s primary responsibilities include:
Developing, approving and publishing new or updated policies, standards and
baselines.
Acting as a liaison with business functions, including Legal and Compliance,
Human Resources, Internal Audit, Risk Management and Systems Development
to ensure fulfillment of the Information Security Program.
Providing guidance and support for information security processes.
Developing information security training and awareness programs and providing
advice and guidance to personnel requiring policy clarification.
Providing support for information classifications, risk analyses, audits and third-
party agreements.
Encouraging personnel to raise potential information security issues with their line
manager or with Information Security Administration and track information
security incidents.
Monitoring general business trends, technological developments, new
threats/vulnerabilities and solutions.
Reporting on the overall sufficiency and effectiveness of the information security
environment.
Working with internal and external auditing groups to assess the effectiveness of
information security processes.
Employing personnel who are equipped with the knowledge, skills, resources and
management support needed to fulfill their roles.
Testing and product evaluation of security elements for technologies, systems or
applications deployed within DST.
Copyright © 2010 DST Systems, Inc.

Share Link: 

datasheetq.com  [ Privacy Policy ]Request Datasheet ] [ Contact Us ]