How do organizations monitor policy violations? What departments are involved?
Is it labour intensive? Edelstein: The sheer volume of data traffic generated in an active IT environment requires precise monitoring of multiple, concurrent streams of communications to effectively and efficiently detect suspect traffic or specific communications in real time. The ability to monitor not only application-level traffic between work-stations and servers but internal and external messaging and file sharing as well requires the integration of probes at strategic points within the infrastructure to identify the target data. These intelligent probes are capable of identifying violations defined by the client’s compliance policy. The complexity of this policy and the actions taken reflect the client’s needs, the policies defined, and authorities of the parties involved in incident response. The development of an IT-based compliance solution involves parties who are typically involved in policy development: Legal, Compliance, Security, Human Resources and Information Technolog
Related Questions
- What is the policy for reporting to NFIRS (National Fire Incident Reporting System) for fire departments or EMS organizations who apply as regional applicants?
- How many Facility Policy Violations can registered student organizations have a semester?
- How do organizations monitor policy violations? What departments are involved?