Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Security Policy Document

This is a preview of the 7-page document
Read full text

Example of hardware assets includes computer hardware, input and storage devices, monitors screen among others. Further, Global Distribution Inc must protect its computer software assets against computer viruses such as Trojan, Malware among others. This may be done through the installation of computer antivirus software to all organization systems. Installation of antivirus software helps to detect and protect a computer system against network viruses that may destroy organization systems and data. The Global Distribution Inc must protect its data assets against destruction and authorized access. Data assets include; information database, user manuals, system documentation, contract agreements and any other organization information within the database (Schlachter, 2005). Organisation data must be protected against unauthorized access.

This means that information regarding cooperate and customers must be protected by ensuring that high level of confidentiality is maintained. This is when corporate information links out; an organization may face threats from its competitors that may jeopardize its operations. Moreover, Global Inc must protect its employee’ s skills, experience, and dignity. This is because employees are the most important assets of any successful organization. Without an organization may not be able to achieve its objectives.

In addition, global Distribution Inc must protect its inventory assets whereby, any data that may help to recover inventory during the occurrence of a disaster should be maintained. Intangible assets such as organization goodwill/reputation and image must be protected. Goodwill is sometimes considered to be an intellectual property and therefore, records containing goodwill and other valuable information about the organization must be protected from an authorized access. Further, intellectual property such as copyrights, patent rights, trademarks, and organization trade should be protected against infringements as well as any form of manipulation.

This is a preview of the 7-page document
Open full text
Close ✕
Tracy Smith Editor&Proofreader
Expert in: Law, Philosophy, Media
Hire an Editor
Matt Hamilton Writer
Expert in: Law, Religion and Theology, People
Hire a Writer
preview essay on Security Policy Document
  • Pages: 7 (1750 words)
  • Document Type: Term Paper
  • Subject: Law
  • Level: College
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us