Apply information security policies

Description

Implement policies, methods and regulations for data and information security in order to respect confidentiality, integrity and availability principles.

Alternative labels

secure data
comply with data protection regulations
information security policy
ensure CIA
apply data protection
ensure confidentiality, integrity and availability principles
data security
protect data
protect information
data protection regulations

Skill type

skill/competence

Skill reusability level

sector-specific

Relationships with skills

Optional skill

Apply information security policies is optional for these skills, according to the role’s responsibility.to master the following skills:

Respect data protection principles

Relationships with occupations

Essential skill

Apply information security policies is an essential skill of the following occupations:

Special forces officer: Special forces officers operate in specialised missions such as counter terrorism missions. They perform combat and intelligence missions in order to impede with enemy equipment and installations, and to gather information on enemy strategy and movement.
Executive assistant: Executive assistants are advanced administrative professionals who work with top-level executives or in international facilities in various industries. They organise meetings, organise and maintain files, arrange travel, train staff members, communicate in other languages, and manage the day-to-day operations of the office.
Mail clerk: Mail clerks perform mail handling, sorting, recording and other duties in connection with mail services from post offices or related organisations. They keep records of the incoming and outgoing packages and letters in the establishment.
Data entry clerk: Data entry clerks update, maintain and retrieve information held on computer systems. They prepare source data for computer entry by compiling and sorting information, process customer and account source documents by reviewing data for deficiencies and verify entered customer and account data.
Data entry supervisor: Data entry supervisors manage the day-to-day operations of data entry staff. They organise the workflow and tasks. 
Database developer: Database developers program, implement and coordinate changes to computer databases based on their expertise of database management systems.
ICT system integration consultant: ICT system integration consultants advise on bringing together different systems to interoperate within an organisation for enabling data sharing and reducing redundancy.

ICT network engineer: ICT network engineers implement, maintain and support computer networks. They also perform network modelling, analysis, and planning. They may also design network and computer security measures. They may research and recommend network and data communications hardware and software.
Chief data officer: Chief data officers manage companies’ enterprise-wide data administration and data mining functions. They ensure data are used as a strategic business asset at the executive level and implement and support a more collaborative and aligned information management infrastructure for the benefit of the organisation at large.

Optional skill

Apply information security policies is optional for these occupations. This means knowing this skill may be an asset for career advancement if you are in one of these occupations.

Enterprise architect: Enterprise architects balance technological opportunities with business requirements. They also maintain a holistic view of the organisation’s strategy, processes, information and ICT assets and link the business mission, strategy and processes to the ICT strategy.
Call centre analyst: Call centre analysts examine data regarding incoming or outgoing customer calls. They prepare reports and visualisation.
Online marketer: Online marketers use e-mail, internet and social media in order to market goods and brands.

Intelligence officer: Intelligence officers develop and execute plans to gather information and intelligence. They investigate the lines of enquiry which would provide them with the necessary intelligence, and contact and interview people who may provide intelligence. They write reports on their results, and perform administrative duties to ensure records maintenance.
Big data archive librarian: Big data archive librarians classify, catalogue and maintain libraries of digital media. They also evaluate and comply with metadata standards for digital content and update obsolete data and legacy systems.
Immigration officer: Immigration officers monitor the eligibility of people, food, electronic devices and merchandise entering a country via an entry point. They use surveillance methods and check identification and documents to ensure entry criteria and custom laws are complied with. They can also conduct interviews with prospective immigrants to verify eligibility and inspect cargo to identify and detect violations.
Call centre supervisor: Call centre supervisors oversee call centre employees, manage projects and understand technical aspects of the call centre activities.
Financial risk analyst: Financial risk analysts correctly identify and review potential risk areas threatening the assets or capital of organisations. They specialise in either credit, market, operational or regulatory risk analysis. They use statistical analysis to evaluate risk, make recommendations to reduce and control risk and review documentation for legal compliance.
Postman/postwoman: Postmen/Postwomen deliver mails and parcel posts to residences and businesses. They perform mail delivery and collect signatures from the recipients. They perform other duties in connection with mail services from post offices or related organisations.
Warfare specialist: Warfare specialists perform strategic duties, such as making tactical decisions, detecting and identifying potential threats, and locating targets and objectives. They communicate with the other teams to ensure the efficiency of the operation, and also oversee the safety of the team.

ICT quality assurance manager: ICT quality assurance managers establish and operate an ICT quality approach through quality management systems, in compliance with internal and external standards and the organisation’s culture. They ensure that the management controls are correctly implemented to safeguard asset, data integrity and operations. They focus on the achievement of quality goals, including the maintenance of the external certification according to quality standards and monitor statistics to forecast quality outcomes.
Credit risk analyst: Credit risk analysts manage individual credit risk and care for fraud prevention, business deal analysis, legal documents analysis and recommendations on the level of the risk.
IT auditor: IT auditors perform audits of information systems, platforms, and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. They evaluate ICT infrastructure in terms of risk to the organisation and establish controls to mitigate loss. They determine and recommend improvements in the current risk management controls and in the implementation of system changes or upgrades.
Parliamentary assistant: Parliamentary assistants provide support to officials and politicians of regional, national and international parliaments and undertake logistical tasks. They revise official documents and follow procedures set by the respective parliaments. They support on the communication with stakeholders and provide the logistical support required in handling official processes.

 


 

References

  1. Apply information security policies – ESCO

 

Last updated on September 21, 2022