You don't have javascript enabled. Please Enabled javascript for better performance.

Draft Cyber Security Policy 2017, Haryana

See details Hide details

Draft Cyber Security Policy 2017, Haryana

The Haryana Cyber Security Policy is being finalized to ensure that:
• Critical IT/ICT information is protected from unauthorized access, use, disclosure, modification, and disposal, whether intentional or unintentional
• The confidentiality, integrity and availability of such information, whether acquired permanently or in transit, provided or created, are ensured at all times, as appropriate.
• Any security incidents and infringement of the Policy, actual or suspected reported are investigated by the designated Chief Information Security Officer and appropriate corrective and preventive action initiated
• Awareness programs on Information Security are available to all Employees and wherever applicable to third party viz. Subcontractors, Consultants, Vendors etc and regular training imparted to them
• Business Continuity Plan is maintained and tested.
• All legal and contractual requirements with regard to information security are met wherever applicable
• The policy will be reviewed at periodic intervals to check for its effectiveness, changes in technology, legal and contractual requirements, and business efficiency.
• The designated Chief Information Security Officer is directly responsible for maintaining and for providing advice and guidance on the policy implementation. The Security Apex Forum is responsible for reviewing the policy according to the defined review process.
• All Managers and Heads of departments are directly responsible for implementing the policy within their business areas and adherence by their staff.

Cyber Security, Haryana Government, Policy, policies, Draft
Reset
2 Record(s) Found

Pradeep Sharma_196 3 weeks 6 days ago

1. All the components of the Web Malware Isolation solution offered should be deployed in outside of the primary network data path ensuring no loss of connectivity in case, of any hardware failure of any of the components of the APT solution.
2. The solution should isolate all web sessions both HTTP and HTTPS -traffic to ensure that no potentially malicious code originating on the web can be transferred to, or affect the endpoint system using the solution.

Gouravtyagi's picture

Gouravtyagi 1 month 3 days ago

our haryana govt. should ensure that all the engineering colleges have good staff so that brilliant students can emerge and they can take part in these activity.All districts should promoted for digital transactions and their should be strict law to maintain this IT policy ,if we compared our state to southern states we are so much far behind them because their education level his too high .they have setup a environment which is fully aware .