According to Oklahomas Official Web Site, Information is a critical State asset. Information is comparable with other assets in that there is a cost in obtaining it and a value in using it. However, unlike many other assets, the value of reliable and accurate information appreciates over time as opposed to depreciating. Shared information is a powerful tool and loss or misuse can be costly, if not illegal. Therefore, the State has provided the Security Policy in order to protect its information assets. The State has established its own Security Policy, which governs all aspects of hardware, software, communication and information. The State Government of Oklahoma defines information as any data or knowledge collected, processed, stored, managed, transferred or disseminated by any method.
The State requires all those who have access to sensitive or confidential information to possess the highest ethical and professional standards in order to prevent the inappropriate transfer of any data. The objective of the State Agency is to protect the information from inadvertent or intentional damage, unauthorized disclosure or use according to the owning Agency’s defined classification standards and procedural guidelines. This includes ccess uthoriztion, termintion of ccess privileges, monitoring of usge nd udit of incidents. The Stte gency is responsible for securing strtegic nd opertionl control of its hrdwre, softwre nd telecommuniction fcilities. The gency is lso responsible for the implementtion of effective sfegurds nd firewlls to prevent unuthorized ccesses to system processes nd computing / telecommuniction opertionl centers.
The Business plan on Case Study: An Information System Management Model
Summary This article presents the purchase management information system, finance management information system and security information system, their interdependence and tight correlation. Furthermore, we state the goals of the purchase management information system that must be achieved in any organisation, as the purchase (sub)process is carried out in every organisation. P-K matrix gives a ...
Bibliography:
Oklahomas Official Web Site, http://www.ok.gov/security_policy.html, retrieved on February 8, 2009.