Background verification checks on all candidates for employment should be carried out in accordance with relevant laws, regulations and ethics. The contractual agreements with employees and contractors should state their and the organization’s responsibilities for information security.
2.2.1 Management responsibilities
Management
should require all employees and contractors to apply information security in
accordance with the established policies and procedures of the organization.
a) are properly briefed on their
information security roles and responsibilities prior to being granted access
to confidential information or information systems;
b) are provided with guidelines
to state information security expectations of their role within the
organization;
c) conform to the terms and
conditions of employment, which includes the organization’s information
security policy and appropriate methods of working;
d) continue to have the
appropriate skills and qualifications and are educated on a regular basis.
2.2.2 Information security
awareness, education and training
All employees
and, where relevant, contractors should receive appropriate awareness education
and training and regular updates in organizational policies and procedures.
2.2.3 Disciplinary process
There should be
a formal and communicated disciplinary process in place to take action against
employees who have committed an information security breach.
2.3.1 Termination or change of
employment responsibilities
Information
security responsibilities and duties that remain valid after termination or
change of employment should be defined, communicated to the employee or
contractor and enforced.
created with
Website Builder Software .