19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.1 Specification of responsibilities and of<br />

requirements for the use of <strong>IT</strong><br />

Initiation responsibility: Agency/company management<br />

Implementation responsibility: Head of <strong>IT</strong> Section, Head of organisation<br />

For the functional areas of "<strong>IT</strong> use" and "<strong>IT</strong> security", responsibilities as well<br />

as authorities must be specified.<br />

For "<strong>IT</strong> use", the responsibility for substantive tasks and operational<br />

responsibility must be laid down. <strong>The</strong> person responsible for substantive tasks<br />

has to develop the specific requirements to be implemented in an <strong>IT</strong><br />

procedure. On the other hand, operational responsibility covers the following<br />

tasks, inter alia:<br />

- data acquisition<br />

- work scheduling and preparation;<br />

- data processing<br />

- post-processing of data output;<br />

- data media management and<br />

- monitoring of procedural execution.<br />

Overall regulations governing "<strong>IT</strong> security", as an aspect of <strong>IT</strong> use, must be<br />

laid down in a binding form. It is advisable to lay down regulations on:<br />

- data backup<br />

- keeping data archives,<br />

- transport of data media<br />

- data transmission<br />

- destruction of data media<br />

- documentation on <strong>IT</strong> procedures, software, <strong>IT</strong> configuration;<br />

- use of passwords;<br />

- entry rights<br />

- access rights<br />

- resources control<br />

- resource management<br />

- purchase and leasing of hardware and software;<br />

- maintenance and repair work;<br />

- software: acceptance and approval;<br />

- software: application development;<br />

- data privacy,<br />

- protection against computer viruses;<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!