ISO 27001 Annex : A.13.2.3 Electronic Messaging & A.13.2.4 Confidentiality or Non-Disclosure Agreements

In this article explain ISO 27001 Annex : A.13.2.3 Electronic Messaging & A.13.2.4 Confidentiality or Non-Disclosure Agreements .

A.13.2.3  Electronic Messaging

Control- Electronic messaging information should be adequately protected.

Implementation Guidance – The following should include information security aspects for electronic messages:

  1. Protecting messages against unauthorized access, change or denial of services in line with the organization’s classification scheme;
  2. ensure that the message is correctly addressed and transported;
  3. Service reliability and availability;
  4. Legal considerations, such as electronic signature requirements;
  5. Approval before using external public authorities, such as instant messaging, social networking or sharing of files;
  6. Stronger standards of publicly accessible network authentication access management.

Other Information – There are various kinds of messages, such as e-mail systems, an exchange of electronic data, and social networking.

Related Product : ISO 27001 Lead Auditor Training And Certification ISMS

A well-known ISO 27001 Lead Auditor and ISO 27001 Lead Implementer certificate that mainly covers information security clauses and their implementation, i.e., controls which should be implemented by the organization to preserve the CIA triad, Confidentiality, Integrity, and Availability to maintain their critical, sensitive information in a secure manner. Infosavvy, a Mumbai- based institute, provides multi-domain certifications and training, which include IRCA CQI ISO 27001:2013 Lead Auditor (LA) and ISO 27001 Lead Implementer (LI) (TÜV SÜD Certification). Infosavvy will help you to understand and recognize the full scope of your organization’s security checks to protect your organization’s activities and information equipment (assets) from attacks, and also to illustrate the backup policy to safeguard if data gets lost due to intentional or natural hazards. It also helps to understand how the operating systems and software integrity can be controlled or administered when they are transferred from one system to another or even from outside the organization, as well as the types of controls required to safeguard the access to confidential information and software. We have trainers with extensive expertise and experience to ensure the efficient handling of the security of information. Consequently, the applicant will gain the necessary skills for the ISMS audit by using commonly agreed audit concepts, procedures and techniques

Also Read : ISO 27001 Annex : A.13.2 Information Transfer

A.13.2.4  Confidentiality or Non-Disclosure Agreements

Control- Information protection requirements of the organization for confidentiality or non-disclosure agreements should be identified, regularly reviewed, and documented.

Implementation Guidance – The requirement to protect confidential information by legal enforceability should be addressed by confidentiality or non-disclosure agreements. Confidentiality or non-disclosure provisions extend to third parties or to the organization’s employees. In view of the kind of the other party and its allowed access or handling of confidential information, elements should be selected or added. to identify confidentiality requirements or non-disclosure agreements,

It should be considered the following elements:

  1. Definition of protected information ( e.g. confidential information);
  2. Expected duration of an agreement, including cases of permanent confidentiality;
  3. the actions needed for termination of an agreement;
  4. Signatory responsibilities and actions to prevent unauthorized disclosure of information;
  5. Information ownership, business secrets and intellectual property, as well as how this relates to privacy;
  6. Made use of the details of confidentiality and signatory ‘s rights to use the data;
  7. the right to audit and monitor confidential information activities;
  8. the notification and reporting process of unauthorized disclosure or leakage of confidential information;
  9. Conditions for the return or destruction of information on cessation of agreement;
  10. Expected measures should only be taken if an agreement is violated.

Other elements may be included during the confidentiality or non-disclosure agreement depending on the information security requirements of an organization.

Confidentiality and non-disclosure agreements would comply with all the laws and codes of integrity applicable to them.

Confidentiality and non-disclosure agreements provisions should be regularly reviewed and these conditions should be impacted when there are changes.

Other Information – Confidentiality and non-disclosure agreements protect organizational information and inform signatory in an authorized and accountable fashion of their responsibility to protect the use of and disclosure of information.

Read More : https://info-savvy.com/iso-27001-annex-a-13-2-3-electronic-messaging-a-13-2-4-confidentiality-or-non-disclosure-agreements/

-------------------------------------------------------------------------------------------------------------------------------------

This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com

Comments

Popular posts from this blog

10 Secrets You Will Never Know About Cyber Security And Its Important

ISO 27001 Annex : A.5 Information Security Policies

Impact Of ISO 27001 Lead Auditor