IT policy and information security management based on ISO 27001

Descripción del Articulo

Technology in recent times has been changing by leaps and bounds and it is natural to acclimatize to these technological changes and even more so due to the covid-19 pandemic in the world, causing drastic change in company strategies. The article presented below aims to describe the causes and effec...

Descripción completa

Detalles Bibliográficos
Autores: Ramos Mamami, Roy Guiller, Cahuaya Ancco, Rogelio, Llanqui Argollo, Roberto René
Formato: artículo
Fecha de Publicación:2023
Institución:Universidad La Salle
Repositorio:Revistas - Universidad La Salle
Lenguaje:español
OAI Identifier:oai:ojs.revistas.ulasalle.edu.pe:article/57
Enlace del recurso:https://revistas.ulasalle.edu.pe/innosoft/article/view/57
https://doi.org/10.48168/innosoft.s11.a57
https://purl.org/42411/s11/a57
https://n2t.net/ark:/42411/s11/a57
Nivel de acceso:acceso abierto
Materia:TIC's (Computer Policy)
compliance
data protection
security
intellectual property
TIC’s (Política Informática)
cumplimiento
protección de datos
seguridad
propiedad intelectual
Descripción
Sumario:Technology in recent times has been changing by leaps and bounds and it is natural to acclimatize to these technological changes and even more so due to the covid-19 pandemic in the world, causing drastic change in company strategies. The article presented below aims to describe the causes and effects of the ISO 27000 standard, focusing on the ISO 27001 standard. In this sense, to ensure an adequate information security policy that, in the absence of national legislation on the subject, must be based on international standards, comparative law and autonomy of will. The methodology used to explain the various areas of impact is followed by the ISO 27001 standard in the domain that refers to compliance and which includes: The ISO 27001 standard helps companies comply with legal requirements, which have the purpose of avoiding the violation of the legislation or the breach of any legal obligation of the entities of any security requirement.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).