Policies You Need to Tackle

 Building an information security program for a Texas government agency can be a complex and multifaceted process. The TAGITM Cyber security committee has published a Quick Start Guide with 6 areas on which to focus when getting started. The last article detailed the first step: have an Interim Incident Response Plan in place if you don’t have anything in place. This month we’re covering how to get started with your Information Security Policies and Procedure program.

These policies should be regularly reviewed, updated, and communicated to all employees and vendors who have access to your data. It's important to note that this is a general guide, and the specific policies required will vary depending on the organization and its unique needs. It is also important to consult with your legal team to ensure the policies will be effective and will meet all applicable regulations and laws. You don’t need to start from scratch; leverage your outside contacts in the IT security field for example policies or templates.  Remember that you don’t have to do it alone. TAGITM has several policy templates and other security resources to help you get started here.

These policies and procedures are essential because they establish a baseline of security practices which help protect against cyber attacks and ensure that employees are aware of their role in maintaining the organization's security. They also demonstrate a commitment to security that can be reassuring to customers and stakeholders.

Lindsay Rash
Education, TAGITM C²