You are on page 1of 5

Basics of IT

Module 1 Introduction to Computer Basics


Module 2 Open Office Calc
Module 3 Open Office Writer
Module 4 Open Office Impress
Module 5 Networking
Module 6 IT Security
Topic 0 Introduction to IT Security
Topic 1 Password Management
Topic 2 Data Protection
Topic 3 Social Networking Sites and Social Netiquettes
Topic 4 Summary

Module 6:
IT Security

Introduction

Transcript

Glossary 6

ICICI Banks policy for IT Security


Information related to the businesses of both ICICI Banks clients and the ICICI Bank is a valuable asset. This shall
be managed accordingly to ensure that it remains complete, accurate and available for authorized business
activities.

This policy applies to all traditional and electronic forms of information created, used or maintained by ICICI
Bank.

Access to information will be made available only to the extent necessary to support authorized business
functions.

Information assets, including information systems will be protected in a manner commensurate with their
sensitivity, value and criticality.

The Information Security Committee will establish appropriate procedures, standards


and guidelines to safeguard the information assets of ICICI Bank.

Introduction

Transcript

Glossary 6

The responsibility for safeguarding information lies with each employee.

All employees, agents, third party service providers, vendors, consultants, etc. who have access to the
information assets of ICICI Bank are required to understand and take action to ensure compliance with any
and all specific policies, procedures, standards and guidelines established in support of ICICI Banks
Information Security Policy.

Each manager will be accountable for implementation and enforcement of this policy as it applies to the
information used in the management of the Group or Department.

Noncompliance with this policy will be subject to management investigation and disciplinary action including
without limitation termination of employment.

Learning Objectives

At the end of this module, you will be able to:


State ICICI Banks Policy regarding IT Security
Manage passwords for data security
Define data protection policy for security compliance
Explain restricted usage of social networking sites for policy compliance

Explain social netiquettes for appropriate communications

Transcript

Glossary 6

You might also like