Enterprise Information Security Policy & Issue-Specific Security Policies


Search for sample security policies on the Web. Identify five EISP and five ISSP sample policies and bring them to class. Compare these with the framework presented in this chapter and comment on the policies’ comprehensiveness. (Whitman, 2017, p.177)

Five Enterprise Information Security Policies are-

In the textbook “Management of Information Security”, Whitman, on the chapter on “Information Security Policies” (p. 147) states that an EISP should typically have “Purpose, Elements, Need, Roles and Responsibilities, and References.”1

The above five examples measure up to this yardstick as depicted in the table below-

  Purpose Elements Need Roles & Responsibilities References Other components
Kennesaw.edu       x x Definitions, Exceptions, Scope, Violations, Associated policies
Mass.gov         x Related Documents, Contact information
Uiowa.edu           Compliance
KingCounty.gov           Definitions, Exceptions
Utah.gov   x x x x Definitions, Enforcements


Five Issue-Specific Security Policies are-

In the textbook “Management of Information Security”, Whitman, on the chapter on Information Security Policies” (p. 152, 153) states that an IISP should typically have “Statement of Purpose, Authorized Uses, Prohibited Uses, Systems Management, Violations of Policy, Policy Renew and Modification, and Limitations of Liability.”1

The above five examples measure up to this yardstick as depicted in the table below-

  DePaul.edu Cmu.edu Ocio.usda.gov Psu.edu Usf.edu
Statement of Purpose          
Authorized Uses          
Prohibited Uses          
Systems Management          
Violations of Policy          
Policy Renew and Modification   x       x
Limitations of Liability     x