Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security Policies - Coggle Diagram
Security Policies
effectiveness of protection measures
security audits
PHPS should regularly review and evaluate the effectiveness of its security measures
monitoring security logs
penetration testing
Responsibility to staff for security of information
he secure handling of personal and confidential data, and understanding the implications of data breaches
This includes safeguarding login credentials, recognizing phishing attempts, and adhering to data protection protocols, according to
All staff have a responsibility to protect information security, which includes adhering to relevant policies
staff access rights to information
Employees generally have the right to access information held about them by their employer
There may be some exceptions to the right of access, such as when the information concerns another individual and consent is required to disclose their information.
This includes information about their performance, disciplinary matters, and other data related to their employment.
Training staff to handle information
providing relevant and accurate information, and implementing a comprehensive training program that includes both initial induction and ongoing refresher training
All employees, regardless of their role, need to be aware of potential cyber threats and how to protect themselves and the organization from these threats
Training staff to handle information effectively involves understanding the specific needs of the organization and its employees
disaster recovery
PHPS need to have a comprehensive data recovery plan
ensure business continuity
regular offsite backup
regular onsite backup
Procedures for recovering data
practise restoring our data