Information security is a holistic discipline, meaning that its application, or lack thereof, affects all facets of an organization or enterprise. The goal of the E-SPIN Information Security Program is to protect the Confidentiality, Integrity, and Availability (CIA) of the data employed within the organization while providing value to the way we conduct business. Protection of the Confidentiality, Integrity, and Availability (CIA) are basic principles of information security, and can be defined as:
- Confidentiality – Ensuring that information is accessible only to those entities that are authorized to have access, many times enforced by the classic “need to know” principle.
- Integrity – Protecting the accuracy and completeness of information and the methods that are used to process and manage it.
- Availability – Ensuring that information assets (information, systems, facilities, networks, and computers) are accessible and usable when needed by an authorized entity.
E-SPIN has recognized that our business information is a critical asset and as such our ability to manage, control, and protect this asset will have a direct and significant impact on our future success.
This document establishes the framework from which other information security policies may be developed to ensure that the enterprise can efficiently and effectively manage, control and protect its business information assets and those information assets entrusted to E-SPIN by its stakeholders, partners, customers and other third parties.
The E-SPIN Information Security Program is built around the information contained within this policy and its supporting policies.
The purpose of the E-SPIN Information Security Policy is to describe the actions and behaviors required to ensure that due care is taken to avoid inappropriate risks to (Company), its business partners, and its stakeholders.
The E-SPIN Information Security Policy applies equally to any individual, entity, or process that interacts with any E-SPIN Information Resource.
- Ensure that an appropriate risk-based Information Security Program is implemented to protect the confidentiality, integrity, and availability of all Information Resources collected or maintained by or on behalf of E-SPIN.
- Ensure that information security processes are integrated with strategic and operational planning processes to secure the organization’s mission.
- Ensure adequate information security financial and personnel resources are included in the budgeting and/or financial planning process.
- Ensure that the Security Team is given the necessary authority to secure the Information Resources under their control within the scope of the E-SPIN Information Security Program.
- Designate an Information Security Officer and delegate authority to that individual to ensure compliance with applicable information security requirements.
- Ensure that the Information Security Officer, in coordination with the Information Security Committee, reports annually to Executive Management on the effectiveness of the E-SPIN Information Security Program.
Information Security Officer
- Chair the Information Security Committee and provide updates on the status of the Information Security Program to Executive Management.
- Manage compliance with all relevant statutory, regulatory, and contractual requirements.
- Participate in security related forums, associations and special interest groups.
- Assess risks to the confidentiality, integrity, and availability of all Information Resources collected or maintained by or on behalf of E-SPIN.
- Facilitate development and adoption of supporting policies, procedures, standards, and guidelines for providing adequate information security and continuity of operations.
- Ensure that E-SPIN has trained all personnel to support compliance with information security policies, processes, standards, and guidelines. Train and oversee personnel with significant responsibilities for information security with respect to such responsibilities.
- Ensure that appropriate information security awareness training is provided to company personnel, including contractors.
- Implement and maintain a process for planning, implementing, evaluating, and documenting remedial action to address any deficiencies in the information security policies, procedures, and practices of E-SPIN.
- Develop and implement procedures for testing and evaluating the effectiveness of the E-SPIN Information Security Program in accordance with stated objectives.
- Develop and implement a process for evaluating risks related to vendors and managing vendor relationships.
- Report annually, in coordination with the Information Security Committee, to Executive Management on the effectiveness of the E-SPIN Information Security Program, including progress of remedial actions.
Information Security Committee
In accordance with the Information Security Committee Charter:
- Ensure compliance with applicable information security requirements.
- Formulate, review and recommend information security policies.
- Approve supporting procedures, standards, and guidelines related to information security.
- Assess the adequacy and effectiveness of the information security policies and coordinate the implementation of information security controls.
- Review and manage the information security policy waiver request process.
- Identify and recommend how to handle non-compliance.
- Provide clear direction and visible management support for information security initiatives.
- Promote information security education, training, and awareness throughout E-SPIN, and initiate plans and programs to maintain information security awareness.
- Educate the team and staff on ongoing legal, regulatory and compliance changes as well as industry news and trends.
- Identify significant threat changes and vulnerabilities.
- Evaluate information received from monitoring processes.
- Review information security incident information and recommend follow-up actions.
- Report annually, in coordination with the Information Security Officer, to Executive Management on the effectiveness of the E-SPIN Information Security Program, including progress of remedial actions.
All Employees, Contractors, and Other Third-Party Personnel
- Understand their responsibilities for complying with the E-SPIN Information Security Program.
- Formally sign off and agree to abide by all applicable policies, standards, and guidelines that have been established.
- Use E-SPIN Information Resources in compliance with all E-SPIN Information Security Policies.
- Seek guidance from the Information Security Team for questions or issues related to information security.
- E-SPIN maintains and communicates an Information Security Program consisting of topic-specific policies, standards, procedures and guidelines that:
- Serve to protect the Confidentiality, Integrity, and Availability (CIA) of the Information Resources maintained within the organization using administrative, physical and technical controls.
- Provide value to the way we conduct business and support institutional objectives.
- Comply with all regulatory and legal requirements, including:
- HIPAA Security Rule,
- State breach notification laws,
- PCI Data Security Standard (PCIDSS),
- Information Security best practices, including ISO 27002 and NIST CSF,
- Contractual agreements,
- All other applicable federal and state laws or regulations.
- The information security program is reviewed no less than annually or upon significant changes to the information security environment.
See Appendix A: Definitions
- ISO 27002: 5, 6, 7, 18
- NIST CSF: ID.AM, ID.BE, ID.GV, PR.AT, PR.IP
- Information Security Committee Charter
Waivers from certain policy provisions may be sought following the E-SPIN Waiver Process.
Personnel found to have violated this policy may be subject to disciplinary action, up to and including termination of employment, and related civil or criminal penalties.
Any vendor, consultant, or contractor found to have violated this policy may be subject to sanctions up to and including removal of access rights, termination of contract(s), and related civil or criminal penalties.
|Version||Modified Date||Approved Date||Approved By||Reason/Comments|
|1.0.0||January 2020||15-Jan-2020||E-SPIN||Document Origination|