Noncompliance Inquiries


Noncompliance inquiries (NCI) were identified as an ISSO responsibility and the process (Figures 8.9 and 8.10) developed by the InfoSec staff and coordinated with the audit and security management. The NCI process was as follows:

  • Receive allegations of non-compliance by auditors, security personnel, managers, users, and generally anyone else.

  • The allegation was evaluated and if not considered acceptable, filed. [7]

  • If the allegation was substantiated, an inquiry was conducted. The inquiry included interviews, technical reviews, document reviews, etc.

  • The information gathered was analyzed, collated, and provided in a formal report to management with copies to appropriate departments such as Security and Human Resources.

  • The report was protected for reasons of privacy and also included recommendations and trend analyses to mitigate future occurrences.

click to expand
Figure 8.9: An overview of the NCI function.

click to expand
Figure 8.10: The NCI process where revocation of user access is a major consideration.

[7]The ISSO was sensitive to privacy issues and did not want to initiate an inquiry without substantiated information since someone may have a grudge against another and use the process to harass him or her.




The Information Systems Security Officer's Guide. Establishing and Managing an Information Protection Program
The Information Systems Security Officers Guide: Establishing and Managing an Information Protection Program
ISBN: 0750698969
EAN: 2147483647
Year: 2002
Pages: 204

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net