ISMS - Roles and responsibilities
Table of Contents
In accordance with the Personal Data Act, the CEO of Conexus is responsible for the use and processing of personal data in Conexus.
The Processing of personal data in Conexus is a line management responsibility. Product Owners and System Owners are given a special responsibility for specific applications and Key Business process Owners for the key business processes.
The CEO has delegated to CISO to keep the ISMS operational, up to date and assist the security organisation to continuously improve.
Conexus' security organization consists of various roles described below. The security organization shall ensure that Conexus safeguards the security of information, personal data or sensitive personal data in all administration of, processing of and access to such data.
The assignment for the roles is based on Norwegian legislation, and Conexus' own interest in safeguarding Conexus' business, our values, our reputation and our obligations in accordance with privacy legislation, contracts and the like.
The term "security officer" can be used for the following roles / individuals.
Role descriptions/responsibilities
Role | Role descriptions/responsibilities |
---|---|
Managers
| The Processing of personal data in Conexus is a line responsibility. Managers are responsible for all information 1, processes and systems within their responsibility area. Tasks might be delegated to:
1 This includes unstructured information in Office 365 (documents, email, Teams, SharePoint etc.), in file-shares, in cloud services, Confluence department areas, SOME, Homepages, and so forth. |
Chief Information Security Officer (CISO) | Overall responsible for the operation of ISMS. Perform the periodic tasks to maintain the Information Security Management System and document in Controlling documents.
|
Information Security Architect (ISA) | Architect for information security has the following main responsibilities:
|
Information Security Manager (ISM) | Assessment The information security manager assesses the organization's security measures, such as firewalls, antivirus software, and passwords, to identify vulnerabilities that could lead to information systems becoming vulnerable to attack. Can perform simulated attacks to test the effectiveness of security measures. Prioritizes security coverage to ensure that strategically important data, such as commercial information or personal information, has the best possible level of security. Guidelines Gives employees and managers different access to the company's data based on roles and work tasks according to corporate policies. Also provides training to employees, explains security risks and demonstrates pattern practices, such as using strong passwords and protecting data when using mobile devices outside the office. Surveillance Develops procedures and automated processes to monitor the status of computers and networks. If the monitoring system detects abnormal behavior patterns, one should respond quickly to find the cause and eliminate any threats. Analyzes reports generated by the monitoring system to identify trends that may indicate a future risk. Meets the objectives of operating system security by contributing information and recommendations to strategic plans and evaluations, preparing and completing action plans, implementing standards for production, productivity, quality and customer service, conducting audits, identifying trends, determining system improvements and implementing changes. Meets the financial requirements for system security by means of forecasts, prepares an annual budget, plans expenses, analyzes deviations and takes the initiative for corrective measures. Protects computer assets by developing security strategies, leading development of system control and access management, monitoring, control and evaluation. Conducts emergency preparedness tests. Leads the preparation and maintenance of plans for disaster recovery of information systems and continuity for the business. Must include deployment and maintenance of workstations and server backup systems Advice to CISO by identifying critical safety issues, recommending solutions to reduce risks. Provides an overview and takes ownership of burglary detection and response. |
DPO | https://gdpr-info.eu/art-39-gdpr/
|