IT Compliance Management Program Development

Being the Chief Information Security Officers (CISO) of the organization, I realize that I have the responsibility of directing staff during their daily activities to ensure that assets in the organization are well protected. However, directing members of staff on matters related to Information Technology count on multidisciplinary and rationalized operations (Ann-Louise, Franc, Werner, Scott, Carsten, Frank & Rudy, 2010).

The basic and most significant regulation is to ensure there is data accountability in every department involved in data handling. These would include measures to facilitating data security and privacy. I can implement strategies such as recording and storing information in non-erasable and non-writable mass storage devices for safekeeping. Additionally, I would ensure that data is constantly checked to determine whether it is correct and up to date.

With the threats of sabotaging communication, banks and other communal facilities impose heavy penalties that can encourage members of staff to follow recommend compliance tools in my organization. I would abide by the rules set to avoid serious consequences in other organizations. For instance, individuals with allegations such as stealing identities, civil damages, and harassment may sue the organization. Therefore, this would help to reduce scandals that may involve accounting departments.

In conclusion, I would advocate for Sarbanes-Oxley Act as my organization’s compliance tool since it is the best in providing set rules and regulations that are observed by those in charge of every department (EMA, 2011). It regulates those in the accounting department to ensure they constantly update a record on non-erasable or rewritable storage devices. Moreover, this can help to ensure that recording of communication data not only involves communication electronic communication, but also other forms of communication like e-mails, messaging, or even phone calls.

References

Ann-Louise B., Franc C., Werner F., Scott H., Carsten L., Frank M., & Rudy T. (2010). IT Security Compliance Management Design Guide. In Axel B., Jose A., David D., Carsten L., Muehlenbroc & Rudy, T. (Eds), IBM corporation. New York: Redbook publishers.

EMA. (2011). IT Business Management Comes of Age: An Enterprise Management Associates. White Paper. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2021, March 20). IT Compliance Management Program Development. https://studycorgi.com/it-compliance-management-program-development/

Work Cited

"IT Compliance Management Program Development." StudyCorgi, 20 Mar. 2021, studycorgi.com/it-compliance-management-program-development/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2021) 'IT Compliance Management Program Development'. 20 March.

1. StudyCorgi. "IT Compliance Management Program Development." March 20, 2021. https://studycorgi.com/it-compliance-management-program-development/.


Bibliography


StudyCorgi. "IT Compliance Management Program Development." March 20, 2021. https://studycorgi.com/it-compliance-management-program-development/.

References

StudyCorgi. 2021. "IT Compliance Management Program Development." March 20, 2021. https://studycorgi.com/it-compliance-management-program-development/.

This paper, “IT Compliance Management Program Development”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.