13.01.2014 Views

Appendices - Hampton Roads Transportation Planning Organization

Appendices - Hampton Roads Transportation Planning Organization

Appendices - Hampton Roads Transportation Planning Organization

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Information Security Policy<br />

APPENDIX C<br />

Information Security Policy Review and Publication Process<br />

1. The ISO determines the need for a new or revised Information Security policy based<br />

on VDOT employee, management or Information Security Advisory Committee input;<br />

industry trends; or perceived vulnerabilities.<br />

2. Tier 1 policies will address a broad mission area such as Information Security.<br />

VDOT will have only one Tier 1 Information Security Policy.<br />

3. Tier 2 policies will address a specific information security vulnerability or internal<br />

control area.<br />

4. Tier 3 policies will define a specific process to be implemented in support of a Tier 2<br />

policy. In cases where the procedure is limited, it may be included as an appendix of<br />

the Tier 2 policy.<br />

5. When the ISO determines that an Information Security Policy needs to be<br />

developed, the development of an initial draft will be assigned to an ISO staff member.<br />

6. The initial draft will then be vetted throughout the ISO and presented to a Core<br />

Review Team. The Core Review Team, made up of three to five members, will review<br />

the draft policy. The membership of this team will typically include a representative from<br />

the Internal Audit division and the Information Technology division as well as<br />

representatives from the affected organizational unit(s) of VDOT.<br />

7. The Core Review Team will review and/or comment on the proposed Information<br />

Security policy for a minimum of 30 days. The Core Review Team will employ formal<br />

review techniques such as a structured walk-thru. During the Core Review Team<br />

review period, others (e.g., other VDOT, VITA) may be invited to participate in the<br />

review virtually.<br />

8. The Core Review Team will prepare the draft policy along with any unresolved<br />

comments for review by the Information Security Advisory Committee.<br />

9. The Information Security Advisory Committee will review the draft document and<br />

recommend its publication by the ISO.<br />

10. The ISO will publish Information Security Policies consistent with the advice of the<br />

Information Security Advisory Committee. Policies will be published in a standard<br />

format with an effective date. All ISO policies will be review and re-published annually.<br />

29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!