Security Policy Awareness and Security Awareness Training Policy

Summary

Security Awareness is a vital piece to the Security Program as all system Users need to understand their role in the protection of SLAM data and digital information. This policy describes the requirements for policy awareness and cybersecurity awareness training.

Body

Security Policy Awareness and Security Awareness Training Policy

Purpose

To reduce the cybersecurity risk to the organization, SLAM is required to design, implement and maintain a coherent set of policies, standards and procedures (collectively the Security Program) to manage risks to its data and information systems. Users are required to protect and ensure the Confidentiality, Integrity, and Availability (CIA) of data and information systems, regardless of audience, purpose, or how data is created, distributed, or stored. Security controls will be tailored accordingly so that cost-effective controls can be applied commensurate with the risk and sensitivity of the data and information system.

Security Awareness is a vital piece to the Security Program as all system Users need to understand their role in the protection of SLAM data and digital information. This policy describes the requirements for policy awareness and cybersecurity awareness training.

Definition

In the realm of IT security terminology, the National Institute of Standards and Technology (NIST) IR 7298, Revision 1, Glossary of Key Information Security Terms, is the primary reference document that SLAM uses to define common IT security terms. Key terminology to be aware of includes:

  • Control: A term describing any management, operational, or technical method that is used to manage risk. Controls are designed to monitor and measure specific aspects of standards to help SLAM accomplish stated goals or objectives.
  • CIA: Confidentiality, Integrity, and Availability of company information systems and the underlying electronic data.
  • Users: SLAM staff, Board Members, volunteers, and contractors who have access to SLAM information systems and who are in a computer-related position of trust.
  • Systems: Information Technology systems (e.g., networks, operating systems, applications and databases)

Policy

IT Staff Responsibilities

  • IT staff will provide a minimum set of training and awareness for all staff, volunteers, and contractors who have access to SLAM information systems and who are in computer-related positions of trust (“Users”).
  • IT staff will provide annual training and other materials to regularly remind workers about their obligations, their responsibilities with respect to information security, and educate them on cybersecurity trends and issues.
  • The IT staff will re-enforce this training with periodic reminders, updates or other communications regarding Information Security (e.g., posters, emails, warning messages, daily tips displayed on screens, events, phishing testing).

SLAM Manager Responsibilities

  • Managers must ensure their direct reports have sufficient training and technical skills to be able to securely operate SLAM information systems to which they have been granted access.
  • To facilitate compliance with the requirements, management must allocate sufficient on-the-job time for workers to acquaint themselves with SLAM security policies, procedures, and related ways of doing business.

User Responsibilities

  • Within their first thirty (30) days of work, all new Users must receive copies of the information security policies that apply to all users and must be made aware that they must comply with the requirements described in these policies as a condition of continued employment.
  • Every User must attest that they understand the SLAM policies surrounding information security.
  • Users must be clearly informed about the actions that constitute security violations as well as how to properly report a suspected security event.
  • Every User must complete information security awareness training sessions delivered electronically via organizations LIM within 30 days of the date when they began work at SLAM. This will include training on cybersecurity, privacy, and password management. Based on their role, additional classes will be assigned as needed.

Approval and Ownership

Owner Title Date
Phillip Deleel IT Director 03/26/2021
Approved By Title Date
Carolyn Schmidt Deputy Director/Controller 05/13/2021

Revision History

Version

Description

Revision Date

Review Date

Reviewer / Approver Name

1 Final 03/26/2021 05/13/2021 Carolyn Schmidt
2 Review   12/05/2022 Phil Deleel
3 Review   05/29/2024 Phil Deleel
4 Review   05/29/2025 Phil Deleel

 

Details

Details

Article ID: 132586
Created
Tue 6/8/21 11:38 AM
Modified
Thu 5/29/25 11:39 AM