SIGN UP FREE
Survey Templates Surveys IT Security in Todays Legislative Framework

IT Security in Todays Legislative Framework

IT Security in Todays Legislative Framework


Hello, my name is Lesley Chaddock and I am currently undertaking a project on the complexities of implementing IT security procedures in today’s legislative framework. This project is in partial fulfilment of the requirements for the degree of Master of Science.


As such you are invited to participate in the following survey and to answer the questions as openly and honestly as you feel able.


For each fully completed survey I receive, I will make a donation to Oxfam to help them to continue with the excellent work they do throughout our world.


An outcome of the project is to develop a practical guide to assist in identifying relevant legislation and prioritising appropriate IT security Best Practice. You may submit your survey anonymously but if you would like to receive a copy of this guide you are invited to submit your email address at the end.


Thank you very much for your time and support. Please start with the survey now by clicking on the Continue button below.


1.Please indicate the size of the Company that you work for:
2.Please provide your job title.
3.Please indicate whether you have a dedicated IT department in your Company.
4.If the answer to the previous question was Yes - how many people are employed within that department?
5.Which department in your Company is responsible for security?
6.Which department in your Company is responsible for Data Protection?
7.Do you have an IT Security Policy (either as a document in its own right or as part of an overall IT Policy)?
8.Does the IT/Security Policy form part of the Contract of Employment?
9.When was your IT Security Policy last updated?
10.When do you next plan to update the IT Security Policy?
11.If the IT Security Policy has been recently updated were all employees made aware of the specific changes?
12.Does the IT Security Policy clearly define what might be considered as misuse of the Company IT systems?
13.Does the IT Security Policy clearly define any disciplinary actions that may be taken in the event of misuse of the Company IT systems?
14.Does your IT Security Policy identify all legislation with which your company aims to comply?
15.Is compliance with your overall IT Security Policy audited?
16.If it is audited - is this a manual or automated process?
17.How often is your IT Security (and Policy) audited?
18.If you do not currently have an IT Security Policy - are you planning to implement one?
19.Do you have specific procedures/checklists in place to cover leavers (this includes dismissal or redundancy)?
20.Is data properly erased from hardware/media before disposal?
Note: By properly we mean using a specific software tool rather than a simple del *.* or reformatting.
21.Does your Company monitor your employees' use of eMail?
22.If you do monitor eMail - do your employees know that they are being monitored?
23.If eMail is monitored are regular reports issued to management?
24.Does your Company monitor your employees' use of the Internet?
25.If Internet use is monitored - do your employees know that they are being monitored?
26.If Internet use is monitored - are regular reports issued to management?
27.Does your Company allow access to 'non-Company' webmail systems? (i.e. Hotmail)
28.Does your Company ban access to specific web sites?
29.Do you know who, in your company, is responsible for ensuring that Corporate Governance issues, which include compliance with relevant legislation, are complied with?
30.If it is you - do you known where to find information relating to the following IT legislation?
Yes
No
The Electronic Commerce (EC Directive) Regulations 2002?
The Privacy & Electronic Communications (EC Directive) Regulations 2003 (European Directive2002/58/EC)
Waste Electrical & Electronic Equipment (WEEE) Directive
EU Directive on the Enforcement of Intellectual Property Rights
The Copyright and Rights in Database Regulation 1997
The Copyright and Related Rights Regulations 2003
The Consumer Protection (Distance Selling) Regulations 2000
Disability Discrimination Act 1995
Protection of Children Act 1978
Obscene Publications Act 1959 (and 1964)
Yes
No
Defamation Act 1996
Public Interest Disclosure Act 1998
The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000
Regulation of Investigatory Powers Act 2000
Freedom of Information Act 2003
Data Protection Act 1998
Computer Misuse Act 1990
Human Rights Act 1998
Trade Marks Act 1994
Copyright, etc, and Trade Marks (Offences and Enforcement) Act 2002
Yes
No
Copyright, Designs and Patents Act 1988
31.Are you aware of any current misuse of IT systems within your Company?
32.If you are aware of any misuse, how was it discovered?
33.Are you aware of any incidents of misuse of IT systems within your Company in the last 12 months?
34.Are you able to provide details of misuse of IT systems? (specifically those that have occurred in the last 12 months)
35.In your opinion, do you think that companies are generally taking IT security seriously and that they are on top of current legislation?
Agree
Neutral
Disagree
Please indicate:
36.Does your Company currently have a recognised IT Security accreditation? (i.e. BS7799 or ISO17799, ITIL, etc.)
37.You may submit your response anonymously but if you provide your eMail address in the space provided I will send you the resulting guidelines.

Related templates and questionnaires